Design and Implementation of Hybrid EC-RSA Security Algorithm Based on TPA for Cloud Storage

Authors

  • Arshi Jabbar M.Tech Scholar, Department of CSE NRI, Bhopal, M.P, India
  • Prof. Umesh Lilhore Dean, PG Department of CSE NRI, Bhopal, M.P, India

DOI:

https://doi.org/10.24113/ojsscience.v3i10.148

Abstract

Cloud storage is one among the service provided by Cloud computing within which information is maintained, managed, secured remotely and created available to users over a network. The user concerning about the integrity of data hold on within the cloud because the user’s data will be attacked or changed by outside attacker. Therefore, a new thought referred to as information auditing is introduced that check the integrity of knowledge with the assistance of an entity referred to as Third Party Auditor (TPA). The aim of this work is to develop an auditing scheme that is secure, economical to use and possess the capabilities like privacy conserving, public auditing, maintaining the information integrity together with confidentiality. It comprises 3 entities: data owner, TPA and cloud server. The data owner performs numerous operations like splitting the file to blocks, encrypting them, generating a hash value for every, concatenating it and generating a signature on that. The TPA performs the main role of knowledge integrity check. It performs activities like generating hash value for encrypted blocks received from cloud server, concatenating them and generates signature on that. It later compares each the signatures to verify whether or not the information stored on cloud is tampered or not. It verifies the integrity of data on demand of the users. To make sure data protection or security of cloud data storage at cloud end, security architecture is designed that secures the data using encryption/decryption algorithm where the proposed algorithm is a hybrid encryption algorithm that uses the concept of EC-RSA, AES algorithm and Blowfish algorithm along with SHA-256 for auditing purpose. Presented experiment results show that the proposed concept is reasonable, it enhancing efficiency about 40% in terms of execution time i.e. encryption as well as decryption time and security and providing confidentiality of cloud data at could end.

Downloads

Download data is not yet available.

References

Mell, Peter, and Tim Grance. The NIST definition of cloud computing, 2011.

Zissis, Dimitrios, and Dimitrios Lekkas, “Addressing cloud computing security issues”, Future Generation computer systems, 2012, pp. 583-592.

Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy Preserving Public Auditing for Secure Cloud Storage. Computers, IEEE Transactions, 2013, pp. 362–375.

Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou. Toward secure and dependable storage services in cloud computing. Services Computing, IEEE Transactions, 2012, pp. 220–232.

IK Meenakshi and Sudha George. Cloud Server Storage Security using TPA. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 2014.

Tejaswini, K. Sunitha, and S. K. Prashanth. Privacy Preserving and Public Auditing Service for Data Storage in Cloud Computing. Indian Journal of Research, 2013.

Jadhav Santosh and B.R Nandwalkar. Privacy Preserving and Batch auditing in Secure Cloud Data Storage using AES. Proceedings of 13th IRF International Conference, 2014.

S Ezhil Arasu, B Gowri, and S Ananthi. Privacy-Preserving Public Auditing in cloud using HMAC Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 2013.

Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, Shiv Shakti Shrivastava, “Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment”, IEEE, pp. 1-8, 2016.

Vishwanath S. Mahalle, Aniket K. Shahade, “Enhancing the data security in Cloud by implementing Hybrid (RSA & AES) Encryption Algorithm”, IEEE, pp. 146-149, 2016.

D.I. George Amalarethinam, H. M. Leena, “Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud”, IEEE, 2016.

G.Prabu kanna and V.Vasudevan, “Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud”, IEEE, pp. 3688-3693, 2016.

Akshita Bhandari, Ashutosh Gupta, Debasis Das, “A framework for Data Security and Storage in Cloud Computing”, IEEE, 2016.

Khalid El Makkaouia, Abderrahim Beni-Hssaneb, Abdellah Ezzatia, Anas El-Ansari, “Fast Cloud RSA Scheme for Promoting Data Confidentiality in the Cloud Computing”, Procedia Computer Science, pp. 33–40, 2017.

R.Swathi and T.Subha, “Enhancing Data Storage Security in Cloud using Certificateless Public Auditing”, IEEE, pp. 348-352, 2017.

Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, C´esar A. F. De Rose and Rajkumar Buyya, “CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms”, Wiley Online Library, 2010.

Downloads

Published

11/30/2017

How to Cite

Jabbar, A., & Lilhore, P. U. (2017). Design and Implementation of Hybrid EC-RSA Security Algorithm Based on TPA for Cloud Storage. SMART MOVES JOURNAL IJOSCIENCE, 3(11), 1–6. https://doi.org/10.24113/ojsscience.v3i10.148