Академический Документы
Профессиональный Документы
Культура Документы
Abstract: Cloud computing is a phrase used to describe a variety of computing concepts that
involve a large number of computers connected through a real-time communication network such
as the Internet. Cloud Computing is an emerging paradigm which has become todays hottest
research area due to its ability to reduce the costs associated with computing. Due to the fast
development of the Cloud Computing technologies, the rapid increase of cloud services are
became very remarkable. Securing data is a challenging issue in todays era. Most of the data
travel over the internet and it becomes difficult to make data secure. The prevalent Problem
Associated with Cloud Computing is the Cloud security and the appropriate Implementation
of Cloud over the Network. In this Research Paper we are using a combination of Blowfish
Algorthim, RSA and Digital Signature for improving the Security.
Keywords: Cloud Computing , Internet, Role Back Access Control, Blowfish Algorthim, RSA
and Digital Signature.
I. INTRODUCTION
Cloud computing is the long dreamed vision of
computing as a utility, where data owners can
remotely store their data in the cloud to enjoy
on-demand high-quality applications and
services from a shared pool of configurable
computing resources. Cloud is a new business
model wrapped around new technologies such as
server virtualization that take advantage of
economies of scale and multi-tenancy to reduce
the cost of using information technology
resources. It also brings new and challenging
security threats to the outsourced data. Since
cloud service providers (CSP) are separate
administrative entities, data outsourcing actually
relinquishes the owners ultimate control over
the fate of their data. The term cloud computing
probably comes from (at least partly) the use of a
cloud image to represent the Internet or some
Copyright to IJARCCE
www.ijarcce.com
7330
Internet (public
multiple groups
clouds) [1].
Copyright to IJARCCE
www.ijarcce.com
7331
User
Admin
Upload
Restriction on
no. of
transaction
Local Cloud
Download
Blowfish +
RSA+ Digital
Signature
File Download
Figure 1 :- Represents the basic design of proposed work
Admin: In an organization, admin create roles be seen as a set of actions or responsibilities
for users & also specify the number of associated with this function. Roles are defined
transactions per user as per their role.
by Administrator according to job competency,
authority, and responsibility within the
User: A user can upload/ download file. When organization. [3].In a RBAC model, all grant
uploading file Blowfish, and RSA schemes are authorizations deal with roles, rather than being
used to encrypt data & signature is included to granted to users by Admin.. RBAC ensures that
lock that data and when downloading the files only authorized users are given access to certain
inversaly Blowfish and RSA are used to decrypt data or resources. Roles are defined by
data & signature is used to unlock the file.
Administrator according to job competency,
authority, and responsibility within the
Local Cloud: Local Cloud is used to store data organization.
in the encrypted form.
Below we will explain RBAC , Blowfish B. Blowfish Algorithm
Algorthim, RSA and Digital Signature.
Blowfish is a symmetric block cipher algorithm.
It uses the same secret key to both encryption
A . ROLE- BASED ACCESS CONTROL
and decryption of messages. The block size for
RBAC is a rich technology and a great effort Blowfish is 64 bits; messages that aren't a
in the field of Access control A role represents a multiple of 64-bits in size have to be padded. It
specific function within an organization and can uses a variable length key, from 32 bits to 448
Copyright to IJARCCE
www.ijarcce.com
7332
1. Key Generation
2. Encryption
3. Decryption
An RSA algorithm is the genetic algorithms in
the security system in the cryptography[6]. In
RSA algorithms first we choose the two
integer values.
Let P and Q are the integer values. Then we find
the value
of N.
N=PQ
(3.1)
(N) = (P 1) (Q 1) (3.2)
Then we choose the value of e, which is not
factor of (N)
And also we find the value of d, which is
related the expectation value (e).
ed = 1 mod (N)
(3.3)
1
Or d = mod (N)
(3.4)
Or d = 1 mod (N)
(3.5)
By Euclidian theorem the value of d depends
upon |(N)|.
The value of d has the modulus values 1, 2n.
d = 1 + |(N)|
(3.6)
RSA algorithms are also used in the
encryption and decryption.
Encryption key = (e, N).
Decryption key = (d, N).
If the message M so the value of M <N.
Encrypt = E = mod N
... (3.7)
D. Digital Signatures
Copyright to IJARCCE
www.ijarcce.com
7333
www.ijarcce.com
7334
When user wants to download a file Signature is 3. Figure 8.represents the downloading a page
required And the Signature is accessed by user via within No Permission To Download Message.
mail.
Because an Employee have restricted only
two
files
have downloaded.
Because
Employee is restricted by an admin. After
accessing two files when Employee wants to
download a third file a message is generated that
Contact to admin.
Copyright to IJARCCE
www.ijarcce.com
7335
Copyright to IJARCCE
ACKNOWLEDGMENT
Author would like to give her sincere gratitude
to guide Mr. Rajiv Kumar Ranjan who
encouraged and guided her throughout this
paper.
REFERENCES
[1]. Uma Somani, Implementing Digital Signature with RSA
Encryption Algorithm to Enhance the Data Security of Cloud in
Cloud Computing," 2010 1st International Conference on Parallel,
Distributed and Grid Computing (PDGC - 2010). Volume 64,
pp.211-216
[2]. Leena Khanna Cloud Computing: Security Issues And Description
Of Encryption Based Algorithms To Overcome Them
International Journal of Advanced Research in Computer Science
and Software Engineering,Volume 3 March - 2013, pp. 279-283.
[3]. Wei-Tek Tsai Role-Based Access-Control Using Reference
Ontology in Clouds978-0-7695-4349-9/11 $26.00 2011 IEEE
DOI 10.1109/ISADS.2011.21
[4].Ajit
Singh,
Securing
Data
by
Using
CryptographywithSteganographyInternational
Journal
of
Advanced Research in Computer Science and Software
EngineeringVolume 3, Issue 5, May 2013 ,pp.404-402
[5].Rashmi Nigoti A Survey of Cryptographic Algorithms for Cloud
Computing IJETCAS 13-123; March-May 2013, pp.141-146
[6]. Parsi Kalpana Data Security in Cloud Computing using RSA
Algorithm International Journal of Research in Computer and
Communication technology, IJRCCT, ISSN 2278-5841, Vol 1,
Issue 4, September 2012.
[7]. Esh Narayan To Enhance the data security of cloud in cloud
computing using RSA Algorthim, Bookman International Journal
of Software Engineering, Vol. 1 No. 1 Sep. 2012 ,ISSN No. 23194278
[8] Pradeep Bhosale Enhancing Data Security in Cloud Computing
Using 3D Framework & Digital Signature with Encryption,
International Journal of Engineering Research & Technology
(IJERT) Vol. 1 Issue 8, October 2012 ,ISSN: 2278-0181
[9]. Vishakha Lokhande Efficient Encryption and Decryption Services
for
Cloud Computing, International Journal of Societal
Applications of Computer Science,Vol 1 Issue 2 December 2012
ISSN 2319 8443.
[10]. RuWei Huang, Si Yu, Wei Zhuang and XiaoLin Gui, Design of
Privacy-Preserving Cloud Storage Framework" 2010 Ninth
International Conference on Grid and Cloud Computing.
www.ijarcce.com
7336
Copyright to IJARCCE
www.ijarcce.com
7337