Cloud Data Security: University College of Engineering, RTU, Kota (Rajasthan)
The document discusses cloud data security. It notes that while organizations are hesitant to move data to the cloud due to security concerns from sharing resources over networks, resource utilization is important for service providers. The objectives of the project are to optimize space for maximum resource use and protect data from unauthorized access. It will use RSA encryption and Huffman coding to securely store data in the cloud.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
161 views
Cloud Data Security: University College of Engineering, RTU, Kota (Rajasthan)
The document discusses cloud data security. It notes that while organizations are hesitant to move data to the cloud due to security concerns from sharing resources over networks, resource utilization is important for service providers. The objectives of the project are to optimize space for maximum resource use and protect data from unauthorized access. It will use RSA encryption and Huffman coding to securely store data in the cloud.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26
Cloud Data Security
University College of Engineering, RTU
,Kota(Rajasthan) Many organization still do not move their data to the cloud because it shares distributed resources via the network in the open environment thus it makes security problems.
From service provider’s point of view, resources
utilization is an important aspect.
In some cases even data are very sensitive therefore it
becomes necessary for the customer to protect the data from unauthorized access The objectives of the project are:
To ensure space optimization so that
maximum resource utilization could be realised.
To ensure data protection from unauthorized
access 1. XAMPP- XAMPP is a free and open source cross platform web server solution stack package developed by Apache Friends. It is a simple, lightweight Apache distribution that makes it extremely easy for developers to create a local web server for testing and deployment purposes. 2. PHP- PHP is a server side scripting language. PHP has been in existence for about twenty-two years. Over this era, many developers have worked on the application to enhance the usage of the application. 3. SqLite- SQLite is a very light weighted database so, it is easy to use it. Reading and writing operations are very fast for SQLite database.It only loads the data which is needed, rather than reading the entire file and hold it in memory. 1.Introduction 2.Motivation 3.Objectives 4.Technologies Used 5.Algorithm Used 6.Plan of Action 7.Key Generation and Encryption Using RSA 8.Space Optimization by Huffman Coding 9.Avalanche Effect 10.Expected Research Outcome 11.Results 12.Refrences Use of of RSA Encryption Algorithm to counter the possible external adversaries attack.
Use of Huffman Coding Algorithm to store data
efficiently secure in the cloud. 1. A text file is taken as an input. 2. A private key & public key is generated using RSA algorithm. 3. Data is encrypted using RSA algorithm with the public key generated in previous step. 4. Encryption Strength is evaluated using Avalanche Effect 5. The encrypted data is deployed to cloud. 6. Encrypted data is space optimized by Huffman encoding in the cloud. 7. Optimized data is accessed from cloud. Figure: Data Transmission from User to Cloud Figure: Data Retrieval From cloud 1. Choose p and q 2. Compute n = p*q 3. Compute φ(n) = (p - 1) * (q - 1) 4. Choose (public key) e such that e is not a factor of φ(n) 5. Choose (private key) d such that d*e mod φ(n) = 1 6. Cipher Text (C.T)=(P.T)e mod n 7. Plain Text (P.T)=(C.T)d mod n Figure: RSA Encryption & Decryption Code Snippet Figure: RSA Encryption & Decryption Output Snippet Huffman coding is a lossless data compression algorithm. The idea is to assign variable length codes to input characters, lengths of the assigned codes are based on the frequencies of corresponding characters. The most frequent character gets the smallest code and the least frequent character gets the largest code. the codes (bit sequences) are assigned in such a way that the code assigned to one character is not prefix of code assigned to any other character. character & Frequency a 5 b 9 c 12 d 13 e 16 f 45 Figure: Huffman Coding code Snippet Figure: Huffman Coding Output Snippet A enviable property of any encryption algorithm is that a small change in either the plaintext or the key must produce a significant change in the cipher text. a change in one bit of the plaintext or one bit of the key should produce a change in many bits of the cipher texts. This property is known as Avalanche effect. The Below Formula can be used to calculate Avalanche Effect:- AE= a/b
where AE is "Avalanche Effect",’a’ is "Number of
flipped bits in ciphered text" and ’b’ is "Number of bits in ciphered text". An automated resource optimization model utilizes space based on Huffman coding is to be testified. This model also tells the strength of encryption using Avalanche effect and can be used for protecting user data in the cloud. 1.Login Screen appears where user has to enter his username and press enter button to login.
Figure: Login Screen Snippet
2.After logging in a screen will appear with below two options .User can choose any one according to requirement.
Figure: Menu Snippet
3.On choosing “Upload and encrypt the file” a screen will appear where user chooses a file and enter secret key ,then press Send Data Button.
Figure: File Upload Portal Snippet
4.Once the user uploads a file with secret key,he can download the encrypted or decrypted file from list of uploaded files.
Figure: List of Uploaded File Download Link Snippet
5.Snippet of database, where all uploaded files are stored with their respective username, secretkey and date of upload.
Figure: Database Storage Snippet
Figure: Encrypted File Output Snippet •Jeeva, D. V. Palanisamy, and K. Kanagaram, “Comparative analysis of performance effciency and security measures of some encryption algorithms,” International Journal of Engineering Research and Applications (IJERA), vol. 2, no. 3, pp. 3033–3037, 2012.
•K. Gai, M. Qiu, and H. Zhao, “Security-aware e_cient mass
distributed storage approach for cloud systems in big data,” in Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on, pp. 140–145, IEEE, 2016 •E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing,” in Informatics and Systems (INFOS), 2012 8th International Conference on, pp. CC–12, IEEE, 2012.
•U. Somani, K. Lakhani, and M. Mundra, “Implementing digital
signature with rsa encryption algorithm to enhance the data security of cloud in cloud computing,” in Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on, pp. 211–216, IEEE, 2010.