SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5122
CLOUD COMPUTING WITH ENCRYPTION
Vishu aggarwal1, Vaibhav kumar2,Nitin rawat3,Ashwani saini4,Sanjeev dhewa5,
Asst prof Ms.ashu jain6
1,2,3,4B.Tech Student, Dept. of Information Technology, Dr. Akilesh Das Gupta Institute of Technology and
Management Delhi
5Mentor: Assistant Professor Ms. Ashu jain, Dept. of Information Technology, Dr. Akhilesh Das Gupta Institute of
Technology and Management, Delhi-110053
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The aim of this project is provide some services
provided by cloud computing to store data at a local level.
Cloud computing has become one of the most widely used
technologies these days but there are many security issues
involved with cloud computing. There are also many privacy
issues involved with cloud computing. These security issues
and privacy issues are handled by encrypting the data to be
stored on the cloud using advanced encryption standard
algorithm. Advanced encryption standard is a very strong
encryption algorithm and no practical cryptanalysis attack
against advanced encryption standard algorithm has not
been discovered yet which makes it suitable to encrypt the
data to be stored on the cloud.
KeyWords: Encryption,Decryption,AES,Cloud,Cryptanalysis
1.INTRODUCTION
Cloud computing is the on demand availability of computer
resources, especially data storage and computing power.
The term Cloud refers to a Network or Internet. The concept
of Cloud Computing came into existence in the year 1950.
Cloud Computing is highly cost effective and offers on-
demand self-service. Cloud Computing offers online
development and deployment tools. cloud-computing
providers offer their "services" accordingtodifferentmodels
of cloud computing. Theses three different models are
Infrastructure as a Service (IaaS), Platform as a Service
(PaaS), and Software as a Service (SaaS). Cloud computing
does not require to install a software to accessormanipulate
cloud. IaaS provides access to fundamental resources, PaaS
provides the runtime environment for applications, SaaS
allows to use softwareapplications as a service toend-users.
Cloud Computing also offers loadbalancing. Thepubliccloud
allows systems and services to be accessible to the general
public. Security in cloud computing is one of the major
concern. Data has to be first encrypted before storing it to
server. Cloud Security Alliance (CSA)stack modeldefinesthe
boundaries between each service model.
2. ENCRYPTION AND CLOUD COMPUTING
In our project we have planned to implement the idea of
storing data on a server securely. Data is first encrypted and
then stored on a server. When a person wants to download
the data from the server he first has to decrypt the data and
then downloadit. A password is used to decryptand encrypt
a data. In this project we have created a website.
Our project has two main modules one is user module and
other one is admin module. The user module has options for
registering a user , login, view profile ,upload file , download
file , calculation module for data file , upload data using aes
encryption. The admin module has options for view user ,
view file and modify user.
Using AES encryption makes data storage on server very
secure hence the name given to the project is secure data
storage on cloud. using this software storage on cloud
becomes very secure and less prone to attackers.
The objective of the project is to create a technology that can
make storage on cloud secure and for that we have used aes
encryptionfor storing data oncloud. Thewebsitewillbevery
simple to use and will be created using html. Coding for
encryption will be done using java. When user downloads a
file he has to provide a key which is used for decrypting the
file . Cloud computing posses many security and privacy
concerns thatcanbe handledonly by usingsomeappropriate
encryption technique. The service provider can access the
data in the cloud at any time and he can also accidently alter
the data thus an ggod encryption is necessary in cloud
computing. Many issues involved in cloud computing easily
gets solved by encrypting the data using a good encryption
technique. Alsoall the data is transferred usingInternet,data
security is a major concern in the cloud and only a good and
strong encryption technique can provide data security.
3. AES ENCRYPTION
The encryption used in this software is AES encryption. No
Practical cryptanalysisattackagainst AESencryptionhasnot
been discovered yet. As no practical cryptanalysis attack
against AES has not been discovered yet attacker cannot
decrypt a file encoded usingaes.There is a very hugeneedof
security in storing data on cloud as the data stored on cloud
gets out of control of user and aes easily secures the data
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5123
before it gets stored on cloud. AES is a very popular and
widely adopted encryption algorithm. AES is faster than
triple des algorithm and more secure than des algorithm.
AES is based on substitution-permutation network and is a
Iterative cipher. Unlike DES, the number of rounds in AES is
variable and it has 10 rounds for 128-bit keys, 12 rounds for
192-bit keys and 14 rounds for 256-bitkeys. Each roundhas
four sub-processes. AES has built-in flexibility of key length.
The AES security is assured only if it is correctly
implemented. AES is a subset of the Rijndael block cipher
developed by two Belgian cryptographers, Vincent Rijmen
and Joan Daemen. In Advanced encryption standard
algorithm the same key is used for both encryption and
decryption. Advanced encryption standard algorithm has
Software implementable in C and Java. AES performs all its
computations on bytes rather than bits. AES treats the 128
bits ofa plaintext block as 16 bytes. The sub-processesinthe
rounds of advanced encryption standard algorithmare Byte
Substitution, Shiftrows, MixColumns and Addroundkey.The
process of decryption of an AES ciphertext is similar to the
encryption process in the reverse order.
4. CONCLUSIONS
This project works on the concept of cloud computing and
data security using AES encryption technique. This project
aims to feature the basic services provided by cloud
computing and to encourage users to use this growing
technology. Using aes encryption storage of data on cloud is
made extremely secure. No practical cryptanalysis attack
against AES encryption has not been discovered yet which
makes AES encryption extremely secure.
Cloud computing poses privacy concerns and these privacy
concerns are easily handled using advanced encryption
standard algorithm.
REFERENCES
[1] http://www.thoughtsoncloud.com/2014/03/a-brief-
history-of-cloud-computing/.
[2] http://www.thoughtsoncloud.com/2014/03/a-brief-
history-of-cloud-computing/.
[3] http://www.thoughtsoncloud.com/2014/03/a-brief-
history-of-cloud-computing/.
Ad

Recommended

PDF
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
 
PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal
 
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
 
PDF
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
 
PDF
Secure Cloud Environment Using RSA Algorithm
IRJET Journal
 
PDF
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
 
PDF
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal
 
PDF
A Secure MSSS Scheme and AES Encryption over Cloud Data
Editor IJCATR
 
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
PDF
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
PDF
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
 
PDF
Cloud summit demystifying cloud security
David De Vos
 
PDF
Cloud Security - Kloudlearn
KloudLearn
 
PPTX
What is Microsoft Azure Security?-Microsoft Azure security
Zabeel Institute
 
PDF
Elastic Security Brochure
Joseph DeFever
 
PPTX
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
PDF
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
PDF
Data Protection & Shadow IT in a cloud era
David De Vos
 
PDF
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
PPTX
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
PPTX
Cloud security
Jhanvi Dattani
 
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
Anusha Chavan
 
PDF
Microsoft_Azure_Network_Security_Mechanisms
robertfischer3
 
PDF
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
 
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 

More Related Content

What's hot (20)

PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
PDF
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
PDF
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
 
PDF
Cloud summit demystifying cloud security
David De Vos
 
PDF
Cloud Security - Kloudlearn
KloudLearn
 
PPTX
What is Microsoft Azure Security?-Microsoft Azure security
Zabeel Institute
 
PDF
Elastic Security Brochure
Joseph DeFever
 
PPTX
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
PDF
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
PDF
Data Protection & Shadow IT in a cloud era
David De Vos
 
PDF
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
PPTX
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
PPTX
Cloud security
Jhanvi Dattani
 
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
Anusha Chavan
 
PDF
Microsoft_Azure_Network_Security_Mechanisms
robertfischer3
 
PDF
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET Journal
 
Cloud summit demystifying cloud security
David De Vos
 
Cloud Security - Kloudlearn
KloudLearn
 
What is Microsoft Azure Security?-Microsoft Azure security
Zabeel Institute
 
Elastic Security Brochure
Joseph DeFever
 
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
Data Protection & Shadow IT in a cloud era
David De Vos
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
Cloud security
Jhanvi Dattani
 
Ensuring data security in cloud computing. - Anusha Tuke
Anusha Chavan
 
Microsoft_Azure_Network_Security_Mechanisms
robertfischer3
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
 

Similar to IRJET- Cloud Computing with Encryption (20)

PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
PDF
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
PDF
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
IRJET Journal
 
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
PDF
Privacy Preservation in cloud Environment using AES Algorithm
IRJET Journal
 
PDF
Kp3419221926
IJERA Editor
 
PDF
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
ijdmsjournal
 
PDF
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
ijdmsjournal
 
PDF
El35782786
IJERA Editor
 
PDF
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
 
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
 
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
PDF
IJARCCE 20
Nahan Rahman
 
PPTX
Cryptography Final Presentation.pptx
GaneshBagul8
 
PDF
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
HimaBinduKrovvidi
 
PDF
Cloud security: literature survey
IJECEIAES
 
PDF
Providing Secure Cloud for College Campus
vivatechijri
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
Privacy Preservation in cloud Environment using AES Algorithm
IRJET Journal
 
Kp3419221926
IJERA Editor
 
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
ijdmsjournal
 
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
ijdmsjournal
 
El35782786
IJERA Editor
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
IJARCCE 20
Nahan Rahman
 
Cryptography Final Presentation.pptx
GaneshBagul8
 
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
HimaBinduKrovvidi
 
Cloud security: literature survey
IJECEIAES
 
Providing Secure Cloud for College Campus
vivatechijri
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
International Journal of Advanced Information Technology (IJAIT)
ijait
 
PPTX
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
PPTX
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
PPTX
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PPTX
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
PDF
Complete University of Calculus :: 2nd edition
Shabista Imam
 
PDF
Complete guidance book of Asp.Net Web API
Shabista Imam
 
PDF
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
PPTX
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
PPTX
Mobile database systems 20254545645.pptx
herosh1968
 
PPTX
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
PPTX
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
PDF
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
PPTX
Introduction to Python Programming Language
merlinjohnsy
 
PDF
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
PDF
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
PPTX
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
 
PPTX
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Complete guidance book of Asp.Net Web API
Shabista Imam
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Mobile database systems 20254545645.pptx
herosh1968
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
Introduction to Python Programming Language
merlinjohnsy
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
 
CST413 KTU S7 CSE Machine Learning Clustering K Means Hierarchical Agglomerat...
resming1
 

IRJET- Cloud Computing with Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5122 CLOUD COMPUTING WITH ENCRYPTION Vishu aggarwal1, Vaibhav kumar2,Nitin rawat3,Ashwani saini4,Sanjeev dhewa5, Asst prof Ms.ashu jain6 1,2,3,4B.Tech Student, Dept. of Information Technology, Dr. Akilesh Das Gupta Institute of Technology and Management Delhi 5Mentor: Assistant Professor Ms. Ashu jain, Dept. of Information Technology, Dr. Akhilesh Das Gupta Institute of Technology and Management, Delhi-110053 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The aim of this project is provide some services provided by cloud computing to store data at a local level. Cloud computing has become one of the most widely used technologies these days but there are many security issues involved with cloud computing. There are also many privacy issues involved with cloud computing. These security issues and privacy issues are handled by encrypting the data to be stored on the cloud using advanced encryption standard algorithm. Advanced encryption standard is a very strong encryption algorithm and no practical cryptanalysis attack against advanced encryption standard algorithm has not been discovered yet which makes it suitable to encrypt the data to be stored on the cloud. KeyWords: Encryption,Decryption,AES,Cloud,Cryptanalysis 1.INTRODUCTION Cloud computing is the on demand availability of computer resources, especially data storage and computing power. The term Cloud refers to a Network or Internet. The concept of Cloud Computing came into existence in the year 1950. Cloud Computing is highly cost effective and offers on- demand self-service. Cloud Computing offers online development and deployment tools. cloud-computing providers offer their "services" accordingtodifferentmodels of cloud computing. Theses three different models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Cloud computing does not require to install a software to accessormanipulate cloud. IaaS provides access to fundamental resources, PaaS provides the runtime environment for applications, SaaS allows to use softwareapplications as a service toend-users. Cloud Computing also offers loadbalancing. Thepubliccloud allows systems and services to be accessible to the general public. Security in cloud computing is one of the major concern. Data has to be first encrypted before storing it to server. Cloud Security Alliance (CSA)stack modeldefinesthe boundaries between each service model. 2. ENCRYPTION AND CLOUD COMPUTING In our project we have planned to implement the idea of storing data on a server securely. Data is first encrypted and then stored on a server. When a person wants to download the data from the server he first has to decrypt the data and then downloadit. A password is used to decryptand encrypt a data. In this project we have created a website. Our project has two main modules one is user module and other one is admin module. The user module has options for registering a user , login, view profile ,upload file , download file , calculation module for data file , upload data using aes encryption. The admin module has options for view user , view file and modify user. Using AES encryption makes data storage on server very secure hence the name given to the project is secure data storage on cloud. using this software storage on cloud becomes very secure and less prone to attackers. The objective of the project is to create a technology that can make storage on cloud secure and for that we have used aes encryptionfor storing data oncloud. Thewebsitewillbevery simple to use and will be created using html. Coding for encryption will be done using java. When user downloads a file he has to provide a key which is used for decrypting the file . Cloud computing posses many security and privacy concerns thatcanbe handledonly by usingsomeappropriate encryption technique. The service provider can access the data in the cloud at any time and he can also accidently alter the data thus an ggod encryption is necessary in cloud computing. Many issues involved in cloud computing easily gets solved by encrypting the data using a good encryption technique. Alsoall the data is transferred usingInternet,data security is a major concern in the cloud and only a good and strong encryption technique can provide data security. 3. AES ENCRYPTION The encryption used in this software is AES encryption. No Practical cryptanalysisattackagainst AESencryptionhasnot been discovered yet. As no practical cryptanalysis attack against AES has not been discovered yet attacker cannot decrypt a file encoded usingaes.There is a very hugeneedof security in storing data on cloud as the data stored on cloud gets out of control of user and aes easily secures the data
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5123 before it gets stored on cloud. AES is a very popular and widely adopted encryption algorithm. AES is faster than triple des algorithm and more secure than des algorithm. AES is based on substitution-permutation network and is a Iterative cipher. Unlike DES, the number of rounds in AES is variable and it has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bitkeys. Each roundhas four sub-processes. AES has built-in flexibility of key length. The AES security is assured only if it is correctly implemented. AES is a subset of the Rijndael block cipher developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen. In Advanced encryption standard algorithm the same key is used for both encryption and decryption. Advanced encryption standard algorithm has Software implementable in C and Java. AES performs all its computations on bytes rather than bits. AES treats the 128 bits ofa plaintext block as 16 bytes. The sub-processesinthe rounds of advanced encryption standard algorithmare Byte Substitution, Shiftrows, MixColumns and Addroundkey.The process of decryption of an AES ciphertext is similar to the encryption process in the reverse order. 4. CONCLUSIONS This project works on the concept of cloud computing and data security using AES encryption technique. This project aims to feature the basic services provided by cloud computing and to encourage users to use this growing technology. Using aes encryption storage of data on cloud is made extremely secure. No practical cryptanalysis attack against AES encryption has not been discovered yet which makes AES encryption extremely secure. Cloud computing poses privacy concerns and these privacy concerns are easily handled using advanced encryption standard algorithm. REFERENCES [1] http://www.thoughtsoncloud.com/2014/03/a-brief- history-of-cloud-computing/. [2] http://www.thoughtsoncloud.com/2014/03/a-brief- history-of-cloud-computing/. [3] http://www.thoughtsoncloud.com/2014/03/a-brief- history-of-cloud-computing/.