Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation
Keywords:
Cloud Computing, Security, AlgorithmsAbstract
Today's fast-growing technology, "Cloud computing," is widely employed in various industries because to its low-cost services, such as pay-per-use mode, which allows users to access resources via an Internet connection. Cloud storage is a service offered by cloud service providers that allows users to store their data on a remote server. Although cloud service providers ensure that data kept in the cloud will be safe and secure, there are a number of issues that must be addressed. For user data in the cloud, data integrity and security must be assured. The integrity of the data must be unmistakable. There are some security dangers associated with storing sensitive data with cloud storage companies. The lack of data integrity is a big worry in the cloud environment. Encryption computations are used to provide complete security of data being sent from one source to another, as well as to prevent private data from being exposed to unauthorized parties. Encryption computations are mostly useful for obtaining and protecting information being sent from one end to the next from any type of flaw. Some of these computations have been adopted by scientists to ensure data security in banking, healthcare, and the military. When used for information security, a fraction of these computations are varied in terms of effectiveness, exactness, dependability, and reaction time. We considered Rivest-Shamir-Adleman (RSA), Advanced Encryption Standard (AES), BLOWFISH, and Data Encryption Standard (DES) calculations in order to conduct a relative evaluation. Because there is scepticism about which of the computations is more reliable, trustworthy, and practical when considering the highlights that depicted their variety. As a result, this work aims to conduct a close examination of each encryption calculation in order to determine the optimal method for employing the specified measures. Python was used to implement modify BLOWFISH's algorithm. When the results are compared to other algorithms results, it is discovered that BLOWFISH takes the shortest time to encrypt, while RSA and AES take the longest. In addition, based on the measurements used in the evaluation, the BLOWFISH calculation is regarded as the most proficient of the three calculations. In this study, only a few of the obtained results are discussed.
Downloads
References
Kumar, A.Y. (2013) Comparative Study of Different Symmetric Key. International Journal of Application or Innovation in Engineering & Management, 2, 204-206.
the cloud,", ww.microsoft.com/government, March 2010. [3] Rajkumar Buyya, James Broberg and Abdrzej Goscinski, "Cloud Computing Principles and Paradigm,", John Wiley and Sons, Inc publication, 2011.
Amazon, "Amazon Web Services," http://aws.amazon.com/, [5] Brian Hay, Kara Nance and Matt Bishop, "Storm Clouds Rising: Security Challenges for IaaS Cloud Computing,", In., Proc, of Hawaii International Conference, IEEE – 2011 [6] Subashini S, Kavitha V. "A survey on security issues in service delivery models of cloud computing.," Network Compute App. (2010), doi: 10.1016/j.jnca.2010.07.006, Elsevier.
R. Sravan Kumar and A. Saxena, "Data integrity proofs in cloud storage," in 2011 Third International Conference on Communication Systems and Networks (COMSNETS), 2011, pp. 1-4.
C. Wang, Q. Wang, K. Ren, and W. Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," IEEE Transactions on Service Computing (TSC), 2012
Y. Zhu, H. Hu, G. Ahn, and M. Yu, "Cooperative provable data possession for integrity verification in multi-cloud storage," IEEE Transactions on Parallel and Distributed Systems, no. 99, 2012.
J. Feng, Y. Chen, W.-S. Ku and P. Liu, "Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms," 2nd International Workshop on Security in Cloud Computing (SCC 2010), San Diego, California, USA, Sep. 14, 2010.
Un Feng, Yu Chen, Douglas H. Summerville, and Kai Hwang "Fair Non-repudiation Framework for Cloud Storage: Part II," in Cloud Computing for Enterprise Architectures, Springer - 2011, pp. 283-300.
Feng, Y. Chen, D. Summerville, W.S. Ku, and Z. Su. "Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol,", in The 8th IEEE Consumer Communications & Networking Conference, 2010.
A. Juels and J. Burton S. Kaliski, "Pors: Proofs of retrievability for large files," in Proc. of CCS'07, Alexandria, VA, October 2007, pp. 584-59
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proc. of CCS'07, Alexandria, VA, October 2007, pp. 598-609.
Abdel-Karim Al Tamimi Performance Analysis of Data Encryption Algorithms https://www.cse.wustl.edu/~jain/cse567-
/ftp/encryption_perf/#Dhawan2002
Yogesh Kumar, Rajiv Munjal, and Harsh Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures ,(IJAFRC) Volume 1, Issue 6, June 2014. ISSN 2348 - 4853
AL.Jeeva, Dr.V.Palanisamy, K.Kanagaram Comparative analysis of performance efficiency and security measures of some encryption ISSN: 2248-9622
Hamdan.O.Alanazi, B.B.Zaidan, . A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani New Comparative Study Between DES, 3DES and AES within Nine Factors JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617
Ritu Tripathi, Sanjay Agrawal Comparative Study of Symmetric and Asymmetric Cryptography Techniques . IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011 ISSN (Online): 2231-5268
Manisha Mahindrakar Evaluation of Blowfish Algorithm based on Avalanche Effect International Journal of Innovations in Engineering and Technology (IJIET) 2014
RituPahal, Vikaskumar, Efficient Implementation of AES, Volume 3, Issue 7, July 2013 ISSN: 2277 128X, © 2013, IJARCSSE
Pratap Chandra Mandal Superiority of blowfish Algorithm , , Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
A study and performance of RSA algorithm, IJCSMC, Vol. 2, Issue. 6, June 2013, pg.126 – 139, ISSN 2320– 088X [24] Karthik .S ,Muruganandam Data encryption and decryption
by using triple DES and performance analysis of crypto system.A, ISSN (Online): 2347-3878 Volume 2 Issue 11, November 2014