Вы находитесь на странице: 1из 26

Cloud Data Security

University College of Engineering, RTU

Many organization still do not move their data to the
cloud because it shares distributed resources via the
network in the open environment thus it makes security

From service provider’s point of view, resources

utilization is an important aspect.

In some cases even data are very sensitive therefore it

becomes necessary for the customer to protect the data
from unauthorized access
The objectives of the project are:

To ensure space optimization so that

maximum resource utilization could be

To ensure data protection from unauthorized

1. XAMPP- XAMPP is a free and open source cross platform
web server solution stack package developed by Apache
Friends. It is a simple, lightweight Apache distribution that
makes it extremely easy for developers to create a local web
server for testing and deployment purposes.
2. PHP- PHP is a server side scripting language. PHP has
been in existence for about twenty-two years. Over this era,
many developers have worked on the application to enhance
the usage of the application.
3. SqLite- SQLite is a very light weighted database so, it is
easy to use it. Reading and writing operations are very fast
for SQLite database.It only loads the data which is needed,
rather than reading the entire file and hold it in memory.
4.Technologies Used
5.Algorithm Used
6.Plan of Action
7.Key Generation and Encryption Using RSA
8.Space Optimization by Huffman Coding
9.Avalanche Effect
10.Expected Research Outcome
Use of of RSA Encryption Algorithm to counter the
possible external adversaries attack.

Use of Huffman Coding Algorithm to store data

efficiently secure in the cloud.
1. A text file is taken as an input.
2. A private key & public key is generated using RSA
3. Data is encrypted using RSA algorithm with the public key
generated in previous step.
4. Encryption Strength is evaluated using Avalanche
5. The encrypted data is deployed to cloud.
6. Encrypted data is space optimized by Huffman encoding in
the cloud.
7. Optimized data is accessed from cloud.
Figure: Data Transmission from User to Cloud
Figure: Data Retrieval From cloud
1. Choose p and q
2. Compute n = p*q
3. Compute φ(n) = (p - 1) * (q - 1)
4. Choose (public key) e such that e is not a factor of φ(n)
5. Choose (private key) d such that d*e mod φ(n) = 1
6. Cipher Text (C.T)=(P.T)e mod n
7. Plain Text (P.T)=(C.T)d mod n
Figure: RSA Encryption & Decryption Code Snippet
Figure: RSA Encryption & Decryption Output Snippet
Huffman coding is a lossless data compression algorithm.
The idea is to assign variable length codes to input
characters, lengths of the assigned codes are based on the
frequencies of corresponding characters.
The most frequent character gets the smallest code and
the least frequent character gets the largest code.
the codes (bit sequences) are assigned in such a way that
the code assigned to one character is not prefix of code
assigned to any other character.
character & Frequency a 5 b 9 c 12 d 13 e 16 f 45
Figure: Huffman Coding code Snippet
Figure: Huffman Coding Output Snippet
A enviable property of any encryption algorithm is that a
small change in either the plaintext or the key must
produce a significant change in the cipher text.
a change in one bit of the plaintext or one bit of the key
should produce a change in many bits of the cipher
This property is known as Avalanche effect.
The Below Formula can be used to calculate
Avalanche Effect:- AE= a/b

where AE is "Avalanche Effect",’a’ is "Number of

flipped bits in ciphered text" and ’b’ is "Number of bits
in ciphered text".
An automated resource optimization model utilizes space
based on Huffman coding is to be testified. This model also
tells the strength of encryption using Avalanche effect and
can be used for protecting user data in the cloud.
1.Login Screen appears where user has to enter his username
and press enter button to login.

Figure: Login Screen Snippet

2.After logging in a screen will appear with below two
options .User can choose any one according to

Figure: Menu Snippet

3.On choosing “Upload and encrypt the file” a screen will
appear where user chooses a file and enter secret key
,then press Send Data Button.

Figure: File Upload Portal Snippet

4.Once the user uploads a file with secret key,he can
download the encrypted or decrypted file from list of
uploaded files.

Figure: List of Uploaded File Download Link Snippet

5.Snippet of database, where all uploaded files are
stored with their respective username, secretkey and
date of upload.

Figure: Database Storage Snippet

Figure: Encrypted File Output Snippet
•Jeeva, D. V. Palanisamy, and K. Kanagaram, “Comparative
analysis of performance effciency and security
measures of some encryption algorithms,” International Journal
of Engineering Research and Applications (IJERA), vol. 2, no.
3, pp. 3033–3037, 2012.

•K. Gai, M. Qiu, and H. Zhao, “Security-aware e_cient mass

distributed storage approach for cloud systems in big data,” in
Big Data Security on Cloud (BigDataSecurity), IEEE
International Conference on High Performance and Smart
Computing (HPSC), and IEEE International Conference on
Intelligent Data and Security (IDS), 2016 IEEE 2nd International
Conference on, pp. 140–145, IEEE, 2016
•E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced
data security model for cloud computing,” in Informatics and
Systems (INFOS), 2012 8th International Conference on, pp.
CC–12, IEEE, 2012.

•U. Somani, K. Lakhani, and M. Mundra, “Implementing digital

signature with rsa encryption algorithm to enhance the data
security of cloud in cloud computing,” in Parallel Distributed and
Grid Computing (PDGC), 2010 1st International Conference on,
pp. 211–216, IEEE, 2010.