Creation of Secure Cloud Environment using RC6 - IEEE Xplore

13 downloads 43289 Views 75KB Size Report
security issues in different cloud environment. This paper presents a new scheme for secure cloud creation using RC6 encryption algorithm for securing the ...
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)

Creation of Secure Cloud Environment using RC6 Narendra Chandel

Sanjay Mishra

Neetesh Gupta

Amit Sinhal

M. Tech Student Dept. of Information Tech. Technocats Inst. of Tech. Bhopal

Assistant Professor, Dept. of Information Tech. Technocats Inst. of Tech. Bhopal

Professor, Dept. of Information Tech. Technocats Inst. of Tech. Bhopal

Professor, Dept. of Information Tech. Technocats Inst. of Tech. Bhopal

[email protected]

[email protected]

[email protected]

[email protected]

Abstract — With the arrival of cloud computing technology utilization of resources is increases multifold, and also increases security issues in different cloud environment. This paper presents a new scheme for secure cloud creation using RC6 encryption algorithm for securing the cloud environment. The results show the performance of proposed technique in public and private cloud. Keywords — Cloud Environment, RC6, Block Cipher Chaining, Symmetric Techniques.

I. INTRODUCTION Cloud computing acting as an interested topic in IT industry. Cloud computing is internet based development and is used for resource utilization in computer technology. Cloud computing manages and schedules the virtualized computing resources via network, and represents a large computing resources pool which provide users on demand services. The network is called “cloud”. Resources in cloud is seems that can be extended unlimitedly, got anytime, used on-demand and paid according to apply. It dynamically delivers everything as a service over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. These services are classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). The cloud can be Public, Private, Hybrid, and Community Cloud. For Detailed description see [1][2][3][4][5] II. SECURITY IN C LOUD R ELATED WORK Today security is main issue in cloud. All industry is moving toward cloud computing so security of data on cloud is essential, different security algorithm (like DES, AES, RSA etc.) has been implemented in cloud computing for creating secure cloud environment. Harauz et al discussed data confidentiality integrity and availability (CIA) for storage in cloud; they focused on encryption in shared storage, preventing unauthorized access to data and backup in storage [6]. Ren et al shows the challenges related to security in public cloud environment [7]. They discussed security data service outsourcing, access control and multitendancy. Ram

978-1-4799-0317-7/13/$31.00©2013 IEEE

Govind[8] et al shows the management of security in cloud environment in their survey. Joes et al [9] developed a system in which cloud is combined with cluster load balancing and SSL over AES. Neha and Gurpeet implemented DES algorithm in cloud data security [10]. In this paper considering the guidelines given by harauz [6] we have implanted RC6 algorithm for creating secured cloud environment. III. PROPOSED DATA S ECURITY WITH RC6 ALGORITHM In Cloud computing, general problems like security of data, files system, backups, network traffic, and host security. Here we are proposing a data security using encryption decryption with RC6 algorithm while we are transferring it over the network. Rivest et al (1998).[11] The security of the cipher is augmented by the simple structure. For instance, the rate of diffusion is increased by several simple steps in the round: integer multiplication, the quadratic equation, and fixed bit shifting. The data-dependent rotations are improved, because the rotation amounts are determined from the high-order bits in f(x), which in turn are dependent on the register bits. RC6 Security has been evaluated to possess an “adequate security margin” (Nechvatal et al, 2000); this rating is given with knowledge of theoretical attacks, which were devised out of the multiple evaluations. The AES-specific security evaluations provide sufficient breadth and depth to how RC6 security is affected by the simplicity of the cipher. Encryption Algorithm: Select a file to store in a cloud before apply rc6 algorithm, Read a selected file and convert data in to byte array Then perform following steps; a. Key Expansion i. A key generate according to system time in millisecond. ii. Store that key in database with file name and pass that key in key expansion function. iii. Key expansion function generate key in fixed byte format in byte array. b. Encryption function i. Pass data and key in the form of byte array pass in encryption function.

317

2013 International Conference on Intelligent Systems and Signal Processing (ISSP) ii. Encryption function return encrypted data in the form of byte array. iii. Write encrypted data in file and store them in cloud. Decryption Algorithm: Select a file in cloud then following step will be perform. i. Access key from database according to file in the cloud. ii. Pass that key in key expansion function and generate key in the form of fixed byte array Read data from selected file and convert encrypted data in byte array. iii. Pass data and key (byte array) in decryption function. iv. Decryption function returns decrypted data in the form of byte array then write this data in temporary file. v. Now user can view that data from temporary file. IV. EXPERIMENTAL R ESULTS AND CONCLUSION The Experiment based on above approach is carried out in Windows 7 on Toshiba Satellite L-700 Dual Core laptop with 2 GB RAM and Processor Speed 2.10 GHz. Java is used as an implantation platform for Dynamic cloud framework by virtualization of software as service (SAAS), which allows users to work with public and private cloud. Once option selected by user it will ask for file to be stored in cloud. After the selection of appropriate file RC6 Encryption is performs on file with unique key generated from system time and key is stored in database for future reference, finally encrypted file is stored in cloud. For accessing a file from the cloud stored key is used for decryption.Table1. shows the time taken in encryption and decryption time of different size of files in secured cloud environment using RC6 algorithm. It is most important that a cloud service provider provides safe and secured uses of cloud to the cloud user. The method is useful in for the secured data storage and transaction over cloud. Cyber crime is a serious threat to the security of cybercitizens and all states of India should take it seriously.

Table1. Time taken in encryption and decryption on various numbers of files using RC6 algorithm.

File Size (KB) 100 200 300 400

Time (Millisecond) Encryption Decryption 13 8 19 17 26 24 36 34

REFERENCES [1]The World Fact Book (2005) Available: http://www.cia.gov/cia/publications/factbook/geos/ug.html, May 2005. [2]Joseph Migga Kizza, “Ethical and Social Issues in the Information Age,” Second Edition, Springer, 2003. [3] Boda Mash, “International Law and Cyber crime” Paper presented at a seminar on Cyber Liability, 25 - 26th November 2002, Pune, India. [4] John W. Ritting house and James F. Ransome, Cloud Computing: Implementation, Management and Security, CRC Press, Taylor Frances Pub. [5] Nick Antonopoulos, Lee Gillam; Cloud Computing: Principles, System & Application, and Springer. [6] Anthony T. Velete, Toby J. Velk, and Robert Eltenpeter, Cloud Computing: A practical Approach, TMH Pub. [7] Saurabh, Cloud Computing : Insight into New Era Infrastructure, Wiley India. [8] Sosinsky, Cloud Computing Bible, Wiley India. [9] John Harauz,Lori M. Kaufman,Bruce Potter, “Data Security in the World of Cloud Computing “; IEEE Computer Society 2009 IEEE. [10] Kui Ren, Cong Wang, and Qian Wang, Security; “Challenges for the Public Cloud;” IEEE Computer Society 2012. [11] Ramgovind S, Eloff MM, Smith E;The Management of Security in Cloud Computing; 2010 IEEE [12] G. Jai Arul Jose, C. Sajeev, Dr. C. Suyambulingom, “Implementation of Data Security in Cloud Computing”, International Journal of P2P Network Trends and Technology- Volume1Issue1- 2011. [13] Neha Jain and Gurpreet Kaur; “Implementing DES Algorithm in Cloud for Data Security”; VSRD-IJCSIT, Vol. 2 (4), 2012, 316-321. [14] Gil- Ho Kim, Jong-Nam Kim, Gyeong-Yeon Cho ;An improved RC6 algorithm with the same structure of encryption and decryption; Feb. 15-18, 2009 ICACT 2009.

318