Data Security in Cloud Computing - 2
Data Security in Cloud Computing - 2
Abstract: Encryption helps in transmitting sensitive data over an insecure channel without any
danger of data being lost or being manipulated by some unauthorized entity. Different Encryption
schemes have been applied for Data security in a different environment. Many cryptosystems
worked during different eras and evolved accordingly with time. This paper mainly focuses on
asymmetric encryption which is also known as Public key encryption scheme or Holomorphic
encryption. However, due to large key size asymmetric encryption is mostly used for Key exchange
rather than data Encryption. Nowadays, Data security is the main issue in large data centers and
Cloud computing. This paper uses Elliptic Curve Cryptography to encrypt data in the cloud
environment because the size of the key used in Elliptic Curve Cryptography is very small. Due to
the small key size of Elliptic Curve, computational power is reduced and this results into least
energy consumption. This paper shows that elliptic curve cryptography is fast and more efficient
for data protection in a cloud computing environment and reduces the computational power and
also increases the efficiency.
Keywords: Data security, RSA, Discrete Logarithm Problem (DLP), Generalized DLP, Elliptic
Curve Cryptosystem (ECC), Cloud Computing
1. Introduction
N early all cryptosystems are based on complex mathematical operations. The symmetric encryption scheme is based
on the single key (Secret Key) with simple mathematical operations like substitution and permutations while
Asymmetric encryption involves either factoring large prime numbers (RSA) or it is based on discrete log problems (DLP).
The public key encryption scheme is also known as a holomorphic cryptosystem. Key size matters a lot in Public key
encryption. Due to this large key size, asymmetric Encryption requires lots of computational power. Modern-day
cryptosystems are using Hybrid encryption schemes that is, Asymmetric encryption for Key exchange and symmetric
encryption for data encryption. Elliptic curve encryption has solved the problem of large key size. ECC uses small key size
to reduce the computational power and this can be implemented in a cloud environment or Wireless sensor networks [1, 2]
or smart devices. In cloud computing, many users store a large amount of data in a cloud environment. So there are many
issues related to data security, privacy, confidentiality, integrity, and authentication. Most of the cloud service provider
stores data in plaintext format and user need to use their encryption algorithm to secure their data if required. The data
needs to be decrypted whenever it is to be processed.
4 Khan et al.: Data Security in Cloud Computing Environment Using Elliptic Curve Cryptography
7
Different Encryption schemes have different problems this paper discusses the problems with existing encryption
schemes and also proposes Elliptic curve encryption for Cloud computing. The paper will elaborate on the process of
Elliptic curve encryption scheme. At the end comparison analysis will be done using mathematical modeling or via a
simulation [3].
Cloud computing is a new term in information technology in which resources are being shared on the distributed
environment over the internet for different purposes like storage and application development. In a cloud environment,
users are working over the internet for applications development, data storage. There are three main applications of cloud
computing. Software as service means software applications deployed over the internet which can act as Service provider to
end-user. Other includes Platform as Service and Infrastructure as Service. Since data is being stored online, so data
security becomes the main issue. In a cloud environment, the security model is based on three types of security operations
which are 1.Key generation 2. Encryption of data 3. Decryption. For this data security Purpose, different encryption
algorithms can be used.
2. Related Work
In this section, we analyze a Public key cryptosystem and how elliptic curve works on prime fields. Asymmetric
Encryption is based on modular arithmetic and DLP. RSA is the most widely used public-key cryptosystem and it is based
on integer factorization [4] which is one-way function. One way functions are those which easy to solve in one direction
but could not be reversed or very difficult to solve backward. Other Cryptosystem like Elgamal Scheme, Diffie Hellman,
and ECC involve groups and Rings. Cyclic groups are used to create generators of elements of sets. For example, let us
take the example of 𝑍*11. O de f G Z*11 10. N e ca c a e e de f e e e e a a 2. We will
perform group operations to find the identity element.
So a=2 is primitive element and generator of all elements of Z*11 group elements. Please note that Z*11
={1,2,3,4,5,6,7,8,9,10}. These groups are the basis for discrete logarithm cryptosystems.
ECC( Key Size in bits) RSA(Key Size in bits) Key Size Ratio
160 1024 1:6
256 3024 1:12
384 7680 1:20
512 16360 1:30
Figure 4. Graphical Representation of Key Size, ECC VS RSA Security on the basis of Key Size
Point Doubling means addition of same point to get new point in such a way that P+ P where P=Q Hence R = P+P =2P
Point addition means adding two different such that P + Q where P and Q are not equal, So R = P + Q
X3= S2- X1 X2 mod P
Y3= S(X1 X3) Y1 mod p.
Where
S = Y2, Y1 mod p if P≠ Q
X2 X1
S= 3X21 + a mod p if P = Q
2Y1
He e S e e f e e. T e e a e e c ae a e cc e ee f c c cg
under some conditions. Elliptic curve discrete logarithm problem (ECDLP) is finding integer s, where 1 s #E such that
P+P+ . +P = P=T e e #E e ea e E c C e. He e e a e e . I ECC e
ae e c ca be a ege e P b c e be T ee T a t on Elliptic curve and is scaler
a .W e e e c e e Z* e e e ege .
IJCCN, vol. 1, no. 1, August 2019 5
0
Alice Bob
Choose private key Choose private key
KprA= a 2,3,4 #E KprB=b 2,3,4 #E
Compute KpubA= aP = A = (XA, YA) Compute KpubB=bP = B =(XB,YB)
Alice send its Public Key to Bob
A
Bob send its Public key to Alice
B
Compute aB=TAB=(XAB , YAB) Compute bA=TAB = (XAB ,YAB)
3. Proposed Scheme
ECC is based on prime fields or the binary extension in the Galois field. It is very difficult to break ECC cryptosystem
because it is difficult to find a relation between P and Q the points on Elliptic curve. In this paper, ECC is used for
encryption, key generation, and decryption. Selection of Point P(x, y) is very important in developing a secure and more
reliable encryption scheme. This paper suggests two-layered approaches to secure data in a cloud environment. One is
dividing the data into small parts and secondly choosing random secure curves for encryption. The two steps will ensure
data security in such a way that quantum computer system may not be able to break data security. As dynamic elliptic
Curve system is being selected for data encryption.
The first step to store data in cloud computing is just to divide the data into 5 data packets. Along with these 5 data
packets add 4 bits 0000(1), 0001(2), 0010(3), 0011(4), 0100(5). These 4-bit data can be randomly added to data Packets.
Secondly, Elliptic curves with different key sizes are chosen to encrypt the data in a cloud environment. So the parameters
for Elliptic curve are chosen from a set of already selected secure Curves. The key size proposed for encryption is small so
that computational power should be minimized. This random selection of curves will help to secure data in many
ways. Data security is based on two factors. One is dividing the data into small parts with the addition of four bits and the
ec d e c g ee cc e d ffe e e (P0, P1, P2, P3 .P -1) for encryption of that data.
This will ensure to secure data as two operations are being performed on data simultaneously. Previously presented papers
were only dividing the data packets into small segments and were using the same ECC for all data segments [2]. Dynamic
key assignment is the most difficult thing which hardened the algorithm used in this proposed scheme. Random number
generator is used to generate points of Elliptic curve within a given range. Whenever the request is generated to encrypt
data, a set of parameters are provided by using these random number. ECC configurable library named as MoTE elliptic
curves [11] was developed by Liu et al using lightweight elliptic curve family.
51 Khan et al.: Data Security in Cloud Computing Environment Using Elliptic Curve Cryptography
5. Conclusions
Cloud computing is emerging as the latest model for data communication. Many Crypto-Algorithms are available for
encryption of data in cloud architecture such as symmetric-key cryptography like AES, DES and Triple DES where a single
key is used for encryption and decryption while in case of asymmetric cryptography like RSA, ECC and Elgamal, pair of
keys (Public and Private Keys) are used. Asymmetric cryptosystems are relatively less vulnerable to attacks and are mostly
used for key management purpose. The most significant algorithm in a public-key cryptosystem is RSA which uses
comparatively larger Key size than ECC. In this paper, we have tried to analyze the efficiency of ECC which are shown in
Table-1 and Table-2. ECC can also optimize memory space as well as reduce the computational complexity which will
result in low energy consumption for smart devices. So ECC is also recommended for smart devices as well. Using ECC in
cloud computing is more reliable and efficient until quantum computers are not available in the market. Quantum Computer
can break the elliptic curve Cryptosystem. However, future work is required for further exploring the storage management
IJCCN, vol. 1, no. 1, August 2019 52
in a cloud environment using ECC. In the future, the proposed model may be implemented in some way or may require
some modification to store data in a cloud environment.
References
[1] K. Khan, "The Security of Elliptic Curve Cryptosystems-A Survey," Global Journal of Computer Science and
Technology, 2015.
[2] A. Chhabra and S. Arora, "an elliptic curve cryptography based encryption scheme for securing the cloud against
eavesdropping attacks," in 2017 IEEE 3rd International Conference on Collaboration and Internet Computing
(CIC), 2017, pp. 243-246.
[3] M.-Q. Hong, P.-Y. Wang, and W.-B. Zhao, "Homomorphic encryption scheme based on elliptic curve
cryptography for privacy protection of cloud computing," in Big Data Security on Cloud (BigDataSecurity),
IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International
Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on, 2016, pp. 152-
157.
[4] C. Paar and J. Pelzl, Understanding cryptography: a textbook for students and practitioners: Springer Science &
Business Media, 2009.
[5] V. Gampala, S. Inuganti, and S. Muppidi, "Data security in cloud computing with elliptic curve cryptography,"
International Journal of Soft Computing and Engineering (IJSCE), vol. 2, pp. 138-141, 2012.
[6] V. S. Miller, "Use of elliptic curves in cryptography," in Conference on the theory and application of
cryptographic techniques, 1985, pp. 417-426.
[7] A. A. Ibrahim, W. Cheruiyot, and M. W. Kimwele, "Data Security in Cloud Computing with Elliptic Curve
Cryptography," International Journal of Computer (IJC), vol. 26, pp. 1-14, 2017.
[8] Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing.
[9] D. Toradmalle, S. B. Ingale, M. G. Chaudhary, A. V. Aishvarya, and A. R. Patil, "A Survey of Different
Encoding Schemes for Improving the Efficiency of Text based Cryptosystem using ECC," International Journal
of Computer Applications, vol. 153, 2016.
[10] Tadapaneni, N. R. (2017). Different Types of Cloud Service Models. Available at SSRN 3614630.
[11] T. Banerjee and M. A. Hasan, "Energy efficiency analysis of elliptic curve based cryptosystems," in 2018 17th
IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE
International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, pp. 1579-1583.
[12] C. Varma, "A Study of the ECC, RSA and the Diffie-Hellman Algorithms in Network Security," in 2018
International Conference on Current Trends towards Converging Technologies (ICCTCT), 2018, pp. 1-4.
[13] A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor
networks," in Proceedings of the 7th international conference on Information processing in sensor networks,
2008, pp. 245-256.
[14] J. Athena and V. Sumathy, "Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing,"
Circuits and Systems, vol. 8, p. 77, 2017.
Copyright © 2019 International Journal of Computing and Communication Networks, All Rights Reserved