Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation

Authors

  • B Chandrashekhar Assistant Professor, Department of MCA, Visvesvaraya Technological University(VTU), Belagavi, India Author
  • Mohamed Abdul Waheed Associate Professor, Department of MCA, Visvesvaraya Technological University(VTU), PG Centre, Kalaburgi, India Author

Keywords:

Cloud Computing, Security, Algorithms

Abstract

Today's fast-growing technology, "Cloud  computing," is widely employed in various industries  because to its low-cost services, such as pay-per-use mode,  which allows users to access resources via an Internet  connection. Cloud storage is a service offered by cloud  service providers that allows users to store their data on a  remote server. Although cloud service providers ensure that  data kept in the cloud will be safe and secure, there are a  number of issues that must be addressed. For user data in  the cloud, data integrity and security must be assured. The  integrity of the data must be unmistakable. There are some  security dangers associated with storing sensitive data with  cloud storage companies. The lack of data integrity is a big  worry in the cloud environment. Encryption computations  are used to provide complete security of data being sent  from one source to another, as well as to prevent private  data from being exposed to unauthorized parties.  Encryption computations are mostly useful for obtaining  and protecting information being sent from one end to the  next from any type of flaw. Some of these computations  have been adopted by scientists to ensure data security in  banking, healthcare, and the military. When used for  information security, a fraction of these computations are  varied in terms of effectiveness, exactness, dependability,  and reaction time. We considered Rivest-Shamir-Adleman  (RSA), Advanced Encryption Standard (AES),  BLOWFISH, and Data Encryption Standard (DES) calculations in order to conduct a relative evaluation.  Because there is scepticism about which of the  computations is more reliable, trustworthy, and practical  when considering the highlights that depicted their variety. As a result, this work aims to conduct a close examination  of each encryption calculation in order to determine the  optimal method for employing the specified measures.  Python was used to implement modify BLOWFISH's  algorithm. When the results are compared to other  algorithms results, it is discovered that BLOWFISH takes  the shortest time to encrypt, while RSA and AES take the  longest. In addition, based on the measurements used in the  evaluation, the BLOWFISH calculation is regarded as the  most proficient of the three calculations. In this study, only  a few of the obtained results are discussed. 

Downloads

Download data is not yet available.

References

Kumar, A.Y. (2013) Comparative Study of Different Symmetric Key. International Journal of Application or Innovation in Engineering & Management, 2, 204-206.

the cloud,", ww.microsoft.com/government, March 2010. [3] Rajkumar Buyya, James Broberg and Abdrzej Goscinski, "Cloud Computing Principles and Paradigm,", John Wiley and Sons, Inc publication, 2011.

Amazon, "Amazon Web Services," http://aws.amazon.com/, [5] Brian Hay, Kara Nance and Matt Bishop, "Storm Clouds Rising: Security Challenges for IaaS Cloud Computing,", In., Proc, of Hawaii International Conference, IEEE – 2011 [6] Subashini S, Kavitha V. "A survey on security issues in service delivery models of cloud computing.," Network Compute App. (2010), doi: 10.1016/j.jnca.2010.07.006, Elsevier.

R. Sravan Kumar and A. Saxena, "Data integrity proofs in cloud storage," in 2011 Third International Conference on Communication Systems and Networks (COMSNETS), 2011, pp. 1-4.

C. Wang, Q. Wang, K. Ren, and W. Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," IEEE Transactions on Service Computing (TSC), 2012

Y. Zhu, H. Hu, G. Ahn, and M. Yu, "Cooperative provable data possession for integrity verification in multi-cloud storage," IEEE Transactions on Parallel and Distributed Systems, no. 99, 2012.

J. Feng, Y. Chen, W.-S. Ku and P. Liu, "Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms," 2nd International Workshop on Security in Cloud Computing (SCC 2010), San Diego, California, USA, Sep. 14, 2010.

Un Feng, Yu Chen, Douglas H. Summerville, and Kai Hwang "Fair Non-repudiation Framework for Cloud Storage: Part II," in Cloud Computing for Enterprise Architectures, Springer - 2011, pp. 283-300.

Feng, Y. Chen, D. Summerville, W.S. Ku, and Z. Su. "Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol,", in The 8th IEEE Consumer Communications & Networking Conference, 2010.

A. Juels and J. Burton S. Kaliski, "Pors: Proofs of retrievability for large files," in Proc. of CCS'07, Alexandria, VA, October 2007, pp. 584-59

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proc. of CCS'07, Alexandria, VA, October 2007, pp. 598-609.

Abdel-Karim Al Tamimi Performance Analysis of Data Encryption Algorithms https://www.cse.wustl.edu/~jain/cse567-

/ftp/encryption_perf/#Dhawan2002

Yogesh Kumar, Rajiv Munjal, and Harsh Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures ,(IJAFRC) Volume 1, Issue 6, June 2014. ISSN 2348 - 4853

AL.Jeeva, Dr.V.Palanisamy, K.Kanagaram Comparative analysis of performance efficiency and security measures of some encryption ISSN: 2248-9622

Hamdan.O.Alanazi, B.B.Zaidan, . A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani New Comparative Study Between DES, 3DES and AES within Nine Factors JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617

Ritu Tripathi, Sanjay Agrawal Comparative Study of Symmetric and Asymmetric Cryptography Techniques . IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011 ISSN (Online): 2231-5268

Manisha Mahindrakar Evaluation of Blowfish Algorithm based on Avalanche Effect International Journal of Innovations in Engineering and Technology (IJIET) 2014

RituPahal, Vikaskumar, Efficient Implementation of AES, Volume 3, Issue 7, July 2013 ISSN: 2277 128X, © 2013, IJARCSSE

Pratap Chandra Mandal Superiority of blowfish Algorithm , , Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering

A study and performance of RSA algorithm, IJCSMC, Vol. 2, Issue. 6, June 2013, pg.126 – 139, ISSN 2320– 088X [24] Karthik .S ,Muruganandam Data encryption and decryption

by using triple DES and performance analysis of crypto system.A, ISSN (Online): 2347-3878 Volume 2 Issue 11, November 2014

Downloads

Published

2022-04-30

How to Cite

Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation . (2022). International Journal of Innovative Research in Engineering & Management, 9(2), 50–58. Retrieved from https://acspublisher.com/journals/index.php/ijirem/article/view/10916