International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 397
“SURVEY OF CRYPTOGRAPHIC TECHNIQUES TO CERTIFY SHARING OF
INFORMATION IN CLOUD COMPUTING”
Nishigandha Sakharkar
1
1
Assistant Professor, CMR Institute of Technology, Hyderabad, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Now the world becomes the world of data
where the large amount of data is shared over the Internet.
Cloud storage is availing this data sharing, still there is lot of
issues to get resolved to maintain the ACID properties of
data. The uniform solution to this is the use of efficient
encryption techniques which will provide cryptographic
approach. This paper presents a view of security folds and
analyses the feasibility of the application of encryption
techniques to make data secure and private over the cloud.
We also discussed about cloud security threats, workings
and challenges that cloud service provider faces in cloud
environment and presenting the study of efficient encryption
techniques enhancing security of data. This paper will
provide a broad view over these techniques.
Key Words: Cloud Computing, ACID, AES, Blowfish, DES,
RSA, IDEA.
1. INTRODUCTION
Cloud computing is a computing standard, where lot of
devices are connected privately or publicly in grid, to
provide dynamic and extensible framework for applications,
storage, minimizing the cost of computation, application
development, data storage and speedy operations. Public,
private and hybrid cloud are the classifications of cloud.
Public clouds are managed as the whole responsibility of the
cloud service provider. The same frameworks for
composition, surveillance, and possible variances are shared
between all the customers. Private clouds are exclusively
limited to a single organization. Data surveillance and
solitude are not the concerns of public cloud as it is opened
to all the customers. Hybrid Clouds is merging of both public
and private cloud models.
Cloud Providers provides three types of services.
1.1 Software as a Service (SaaS): This will provide a
readymade solution for the end users where they can
directly access the services. Multiple end users are serviced
by this single set of services over cloud.
1.2 Platform as a Service (Paas): This is a layered
architecture where the computing resources are together
proposed as a service, upon which other upper layers of
services can be erected. The user is free to create his own
practices, according to the provider’s prototype.
3. Infrastructure as a Service (Iaas): Over the network
IaaS provides basic storing and processing capabilities as
functional services. All computing resources are virtualized
and proposed for processing. The end user can develop his
own work practices on the framework.
Fig-1: Cloud Computing Architecture
2. CRITICAL THREATS TO CLOUD SECURITY
Cloud security is still a big challenge for application
developers; as individuals wants to store and access their data
more securely. With so many recent threats and technological
attacks, maintaining security has become all the more
important. The following threats may break the security of
cloud:
a) An unauthorized user can access data which leads to data
loss which can disturb businesses and consumers in a variety
of ways.
b) Absence of extensible integrity approach, on-going
computerized rotation of cryptographic keys, strong
passwords and certificates.
c) Spectre and Meltdown one most disturbing cloud safety
related issues, an erroneous set of design features in most
modern devices has the capacity to allow content to be read
from memory through the use of malignant JavaScript code.
d) Cloud customers also facing the problem of data loss and
understanding the solutions and which body is responsible for
data loss and under what circumstances is difficult.
e) High chances of DoS attacks which leads to shut down a
system or network, making it idle to its intended user, this is
accomplished by flooding the target with traffic, or sending
it information that triggers a crash.