SlideShare a Scribd company logo
2
Most read
3
Most read
Presented By:
1. Rafiq, Fatema Binta (13-23447-1)
2. Rahman, Mahmuda (13-22990-1)
3. Rabbi, Md. Fazla (13-23679-1)
4. Ali, Nafis (13-24925-3)
5. Hossain, F.M. Tanvir (13-23513-1)
Analysis of Security
Algorithms in Cloud
Computing
Instructor:
Shahrin Chowdhury
 INTRODUCTION
 CHALLENGE
 DATA STORAGE & SECURITY IN
CLOUDE COMPUTING
 Data Security Issues in Cloud
Computing
 EXISTING ALGORITHM FOR
SECURITY
 AES
 RSA
 Further development proposal
 CONCLUSION
Index
INRODUCTION
Security system in cloud for storing data
is not safe enough. When data is valuable
specially in the cloud computing, it's
security considered to be the key
requirement. Also it is get more
important when it is hard to make it
safe. It becomes hard to keep data safe
due to lack of strong data encryption
system. Cloud possesses the security
problem in Data segregation, Data theft,
unauthorized access, Uncleaned Owner
and responsibility of Data Protection,
Data Loss conditions.
Tuesday, October 11,
2016
3
CHALLENGE
The following are some of the
notable challenges associated with
cloud computing, and although
some of these may cause a
slowdown when delivering more
services in the cloud, most also can
provide opportunities, if resolved
with due care and attention in the
planning stages.
• Security and Privacy
• Lack of Standards
• Continuously Evolving
Tuesday, October 11,
2016
4
Data Storage & Security in Cloud Computing
Cloud storage services may be accessed through a web service
application programming interface (API), a cloud storage
gateway or through a Web-based user interface. Cloud storage
is:
 made up of many distributed resources, but still acts as one
 highly fault tolerant through redundancy and distribution of
data
 highly durable through the creation of versioned copies
 typically eventually consistent with regard to data replicas.
Tuesday, October 11,
2016
5
Data Security Issues in Cloud Computing
 Transmit and store user’s information as little as possible. After
systemic analysis, the cloud computing applications will collect and
store the most necessary information only.
 Security measures will be adopted to prevent unauthorized access,
copying, using or modifying personal information.
 Achieve user’s control to the greatest degree. Firstly, it is necessary to
allow the user to control the most critical and important personal
information. Secondly, it is available to manage personal information
by a trusted third party.
Tuesday, October 11,
2016
6
Data Security Issues in Cloud Computing
 Allow users to make choice. Users have the right to select the use of
personal information. Besides, they can join or leave freely.
 Make clear and limit the purpose of use of data. Personal information
must be used and handled by the person with specific identification
for specific purpose and owner of information should be notified
before using.
 Establish feedback mechanism to ensure that safety tips and detailed
measures of the service will be provided to the user timely.
 It can maximize the security of user’s data after introducing principles
above
Tuesday, October 11,
2016
7
Pseudo code of AES Algorithm
 The AES algorithm performs a number
Nr of cryptographic rounds depending
on the actual key length. It has
variable key length of 128, 192, or
256 bits.
 Each round consists of four byte-
oriented cryptographic
transformations
 Byte Substitution
 Shifting rows of state array
 Mixing data within a column of the
state array
 Round key addition to the state array
Cipher(byte[] input, byte[] output)
{
byte[4,4] State;
copy input[] into State[] AddRoundKey
for (round = 1; round < Nr-1; ++round)
{
SubBytes ShiftRows MixColumns
AddRoundKey
}
SubBytes ShiftRows AddRoundKey
copy State[] to output[]
}
Tuesday, October 11,
2016 8
Activity Diagram of AES Algorithm
Tuesday, October 11,
2016
9
Advantage:
Extremely Secure
When it uses a secure algorithm,
symmetric key encryption can be
extremely secure. When you use
it with its most secure 256-bit key
length, it would take about a
billion years for a 10 petaflop
computer to guess the key
through a brute-force attack.
Relatively Fast
Encrypting and decrypting
symmetric key data is relatively
easy to do, giving you very good
reading and writing performance.
Disadvantage:
Sharing the Key
The biggest problem with symmetric
key encryption is that you need to
have a way to get the key to the party
with whom you are sharing data.
Encryption keys aren't simple strings
of text like passwords.
More Damage if Compromised
When someone gets their hands on a
symmetric key, they can decrypt
everything encrypted with that key.
When you're using symmetric
encryption for two-way
communications, this means that both
sides of the conversation get
compromised.
Tuesday, October 11,
2016
10
Pseudo Code for RSA Algorithm
 Key Generation Algorithm
1. Choose two very large random
prime integers:
p and q
2. Compute n and φ(n):
n = pq and φ(n) = (p-1)(q-1)
3. Choose an integer e,
1 < e < φ(n) such that:
gcd(e, φ(n)) = 1(where gcd means
greatest common denominator)
4. Compute d, 1 < d < φ(n) such
that:
ed ≡ 1 (mod φ(n))
 the public key is (n, e) and the private
key is (n, d)
 the values of p, q and φ(n) are private
 e is the public or encryption exponent
 d is the private or decryption exponent
 Encryption
The cyphertext C is found by the
equation 'C = Me mod n' where M is
the original message.
 Decryption
The message M can be found form the
cyphertext C by the equation 'M = Cd
mod n'.
Tuesday, October 11,
2016 11
Activity Diagram of RSA Algorithm
Encryption
Public Key
Private Key Decryption
Sender Receiver
Generate Key
To the public
Cipher text
Transmission
Medium
Plain text
Plain text
Tuesday, October 11,
2016 12
Advantage:
Increased security and convenience
Private keys never need to be
transmitted or revealed to anyone.
Digital signatures that cannot be
repudiated
Authentication via secret-key systems
requires the sharing of some secret
and sometimes requires trust of a
third party as well. As a result, a
sender can repudiate a previously
authenticated message by claiming
the shared secret was somehow
compromised) by one of the parties
sharing the secret.
Disadvantage:
Encryption speed Slow
For encryption, the best solution is to
combine public- and secret-key systems in
order to get both the security advantages
of public-key systems and the speed
advantages of secret-key systems. Such a
protocol is called a digital envelope.
Vulnerability risk
A successful attack on a certification
authority will allow an adversary to
impersonate whomever he or she chooses
by using a public-key certificate from the
compromised authority to bind a key of
the adversary's choice to the name of
another user.
Tuesday, October 11,
2016
13
Further development proposal
 Multiple encryption
 Data storage method
 Biometric security
Tuesday, October 11,
2016
14
Conclusion
Cloud computing is changing the way IT departments buy IT.
Businesses have a range of paths to the cloud, including
infrastructure, platforms and applications that are available
from cloud providers as online services. Security is a major
requirement in cloud computing while we talk about data
storage. There are number of existing techniques used to
implement security in cloud. We discussed one symmetric and
asymmetric algorithm. Our future will be considering some
problems related to existing security algorithms and
implement a better version of AES & RSA.
Tuesday, October 11,
2016
15
Left the world…
Trapped me to answer the
question of unknown
Answers…
Left silently *sigh*..
Don’t Ask Questions
Please.
Tuesday, October 11,
2016 16
References
 Randeep Kaur ,Supriya Kinger, “Analysis of Security
Algorithms in Cloud Computing“, International Journal
of Application or Innovation in Engineering &
Management (IJAIEM), Volume 3, Issue 3, March 2014 .
 http://www.emc.com/emc-plus/rsa-labs/standards-
initiatives/advantages-and-disadvantages.htm
 http://science.opposingviews.com/advantages-
disadvantages-symmetric-key-encryption-2609.html
Tuesday, October 11,
2016 17

More Related Content

PPTX
Cloud computing ppt
PDF
Cloud Security, Standards and Applications
PPTX
Cloud Computing Fundamentals
PPTX
Characteristics of cloud computing
PDF
Virtualization
PDF
Collaborating Using Cloud Services
PPT
AWS Presentation
PDF
A brief history of cloud computing
Cloud computing ppt
Cloud Security, Standards and Applications
Cloud Computing Fundamentals
Characteristics of cloud computing
Virtualization
Collaborating Using Cloud Services
AWS Presentation
A brief history of cloud computing

What's hot (20)

PPTX
Presentation on IOT SECURITY
PPTX
Micro encapsulation ppt
PPTX
運用自動化のためのプログラミング言語の作り方
PDF
NF102: Nutanix AHV Basics
PPTX
Cloud computing and Cloud Enabling Technologies
PPT
Cloud deployment models
KEY
Amazon's Simple Storage Service (S3)
PPTX
Unit-I Introduction to Cloud Computing.pptx
PPTX
Cloud computing
PPTX
Disadvantages of cloud computing
PDF
Temper resistante. ppt
PPT
Fullandparavirtualization.ppt
PDF
Novelty and-compliance-of-oral-fast-dissolving-thin-film--a-patient-friendly-...
PPTX
Cloud security
PPTX
Modern Block Cipher- Modern Symmetric-Key Cipher
PPTX
SEMINAR ON CYBER SECURITY.pptx
PPTX
Virtual Machine provisioning and migration services
PPSX
Key Challenges In CLOUD COMPUTING
PPTX
NIST Model of Cloud Computing by Piyush Bujade.pptx
PPTX
Cloud Computing PPT.pptx
Presentation on IOT SECURITY
Micro encapsulation ppt
運用自動化のためのプログラミング言語の作り方
NF102: Nutanix AHV Basics
Cloud computing and Cloud Enabling Technologies
Cloud deployment models
Amazon's Simple Storage Service (S3)
Unit-I Introduction to Cloud Computing.pptx
Cloud computing
Disadvantages of cloud computing
Temper resistante. ppt
Fullandparavirtualization.ppt
Novelty and-compliance-of-oral-fast-dissolving-thin-film--a-patient-friendly-...
Cloud security
Modern Block Cipher- Modern Symmetric-Key Cipher
SEMINAR ON CYBER SECURITY.pptx
Virtual Machine provisioning and migration services
Key Challenges In CLOUD COMPUTING
NIST Model of Cloud Computing by Piyush Bujade.pptx
Cloud Computing PPT.pptx
Ad

Viewers also liked (20)

PPTX
Cryptography
PPTX
multiple encryption in clouud computing
PPTX
Privacy preserving public auditing
PPTX
Security Issues in Cloud Computing
PDF
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
PPTX
Cloud security ppt
PPTX
Data security in cloud computing
PPT
Seminar on cloud computing by Prashant Gupta
DOCX
cloude computing report
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
DOCX
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
PDF
Cloudarmor supporting reputation based trust management for cloud services
PDF
Cloud armor supporting reputation based trust management for cloud services
DOCX
Cloudarmor supporting reputation based trust management for cloud services
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PPTX
Cloud computing
PPTX
Data storage security in cloud computing
PPTX
Storage on cloud using dynamic encryption
PDF
Classification of secure encrypted relationaldata in cloud computing
PPTX
Cloud computing and security final
Cryptography
multiple encryption in clouud computing
Privacy preserving public auditing
Security Issues in Cloud Computing
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Cloud security ppt
Data security in cloud computing
Seminar on cloud computing by Prashant Gupta
cloude computing report
Trust and Cloud computing, removing the need for the consumer to trust their ...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
Cloudarmor supporting reputation based trust management for cloud services
Cloud armor supporting reputation based trust management for cloud services
Cloudarmor supporting reputation based trust management for cloud services
Secure data sharing in cloud computing using revocable storage identity-based...
Cloud computing
Data storage security in cloud computing
Storage on cloud using dynamic encryption
Classification of secure encrypted relationaldata in cloud computing
Cloud computing and security final
Ad

Similar to Analysis of-security-algorithms-in-cloud-computing [autosaved] (20)

PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
PPT
Attaining data security in cloud computing
PDF
Cloud computing and a new approach in data encryption technique
PDF
Secure Cloud Environment Using RSA Algorithm
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
PDF
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
PDF
Big data security_issues_research_paper
PDF
Cloud Cryptography
PDF
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
PPTX
Data security using rsa
PDF
Kp3419221926
PPTX
Cryptography Final Presentation.pptx
PDF
Exploring Cloud Encryption
PDF
Q01725110114
PDF
Enhancing Cloud Computing Security for Data Sharing Within Group Members
PPTX
CRYPTOGRAPHY IN CLOUD COMPUTING Presentation
PDF
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
PDF
Secure Data Storage on Cloud System for Privacy Preserving
PDF
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Attaining data security in cloud computing
Cloud computing and a new approach in data encryption technique
Secure Cloud Environment Using RSA Algorithm
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Big data security_issues_research_paper
Cloud Cryptography
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Data security using rsa
Kp3419221926
Cryptography Final Presentation.pptx
Exploring Cloud Encryption
Q01725110114
Enhancing Cloud Computing Security for Data Sharing Within Group Members
CRYPTOGRAPHY IN CLOUD COMPUTING Presentation
Securing iClouds Storage Based On Combination of RSA and AES Crypto System
Secure Data Storage on Cloud System for Privacy Preserving
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...

Recently uploaded (20)

DOCX
573137875-Attendance-Management-System-original
PPTX
AgentX UiPath Community Webinar series - Delhi
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Simulation of electric circuit laws using tinkercad.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
Chapter 6 Design in software Engineeing.ppt
PPTX
436813905-LNG-Process-Overview-Short.pptx
PPTX
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
PPTX
Internship_Presentation_Final engineering.pptx
PDF
Geotechnical Engineering, Soil mechanics- Soil Testing.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
anatomy of limbus and anterior chamber .pptx
573137875-Attendance-Management-System-original
AgentX UiPath Community Webinar series - Delhi
Structs to JSON How Go Powers REST APIs.pdf
Simulation of electric circuit laws using tinkercad.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Arduino robotics embedded978-1-4302-3184-4.pdf
OOP with Java - Java Introduction (Basics)
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Chapter 6 Design in software Engineeing.ppt
436813905-LNG-Process-Overview-Short.pptx
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
Internship_Presentation_Final engineering.pptx
Geotechnical Engineering, Soil mechanics- Soil Testing.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Lesson 3_Tessellation.pptx finite Mathematics
anatomy of limbus and anterior chamber .pptx

Analysis of-security-algorithms-in-cloud-computing [autosaved]

  • 1. Presented By: 1. Rafiq, Fatema Binta (13-23447-1) 2. Rahman, Mahmuda (13-22990-1) 3. Rabbi, Md. Fazla (13-23679-1) 4. Ali, Nafis (13-24925-3) 5. Hossain, F.M. Tanvir (13-23513-1) Analysis of Security Algorithms in Cloud Computing Instructor: Shahrin Chowdhury
  • 2.  INTRODUCTION  CHALLENGE  DATA STORAGE & SECURITY IN CLOUDE COMPUTING  Data Security Issues in Cloud Computing  EXISTING ALGORITHM FOR SECURITY  AES  RSA  Further development proposal  CONCLUSION Index
  • 3. INRODUCTION Security system in cloud for storing data is not safe enough. When data is valuable specially in the cloud computing, it's security considered to be the key requirement. Also it is get more important when it is hard to make it safe. It becomes hard to keep data safe due to lack of strong data encryption system. Cloud possesses the security problem in Data segregation, Data theft, unauthorized access, Uncleaned Owner and responsibility of Data Protection, Data Loss conditions. Tuesday, October 11, 2016 3
  • 4. CHALLENGE The following are some of the notable challenges associated with cloud computing, and although some of these may cause a slowdown when delivering more services in the cloud, most also can provide opportunities, if resolved with due care and attention in the planning stages. • Security and Privacy • Lack of Standards • Continuously Evolving Tuesday, October 11, 2016 4
  • 5. Data Storage & Security in Cloud Computing Cloud storage services may be accessed through a web service application programming interface (API), a cloud storage gateway or through a Web-based user interface. Cloud storage is:  made up of many distributed resources, but still acts as one  highly fault tolerant through redundancy and distribution of data  highly durable through the creation of versioned copies  typically eventually consistent with regard to data replicas. Tuesday, October 11, 2016 5
  • 6. Data Security Issues in Cloud Computing  Transmit and store user’s information as little as possible. After systemic analysis, the cloud computing applications will collect and store the most necessary information only.  Security measures will be adopted to prevent unauthorized access, copying, using or modifying personal information.  Achieve user’s control to the greatest degree. Firstly, it is necessary to allow the user to control the most critical and important personal information. Secondly, it is available to manage personal information by a trusted third party. Tuesday, October 11, 2016 6
  • 7. Data Security Issues in Cloud Computing  Allow users to make choice. Users have the right to select the use of personal information. Besides, they can join or leave freely.  Make clear and limit the purpose of use of data. Personal information must be used and handled by the person with specific identification for specific purpose and owner of information should be notified before using.  Establish feedback mechanism to ensure that safety tips and detailed measures of the service will be provided to the user timely.  It can maximize the security of user’s data after introducing principles above Tuesday, October 11, 2016 7
  • 8. Pseudo code of AES Algorithm  The AES algorithm performs a number Nr of cryptographic rounds depending on the actual key length. It has variable key length of 128, 192, or 256 bits.  Each round consists of four byte- oriented cryptographic transformations  Byte Substitution  Shifting rows of state array  Mixing data within a column of the state array  Round key addition to the state array Cipher(byte[] input, byte[] output) { byte[4,4] State; copy input[] into State[] AddRoundKey for (round = 1; round < Nr-1; ++round) { SubBytes ShiftRows MixColumns AddRoundKey } SubBytes ShiftRows AddRoundKey copy State[] to output[] } Tuesday, October 11, 2016 8
  • 9. Activity Diagram of AES Algorithm Tuesday, October 11, 2016 9
  • 10. Advantage: Extremely Secure When it uses a secure algorithm, symmetric key encryption can be extremely secure. When you use it with its most secure 256-bit key length, it would take about a billion years for a 10 petaflop computer to guess the key through a brute-force attack. Relatively Fast Encrypting and decrypting symmetric key data is relatively easy to do, giving you very good reading and writing performance. Disadvantage: Sharing the Key The biggest problem with symmetric key encryption is that you need to have a way to get the key to the party with whom you are sharing data. Encryption keys aren't simple strings of text like passwords. More Damage if Compromised When someone gets their hands on a symmetric key, they can decrypt everything encrypted with that key. When you're using symmetric encryption for two-way communications, this means that both sides of the conversation get compromised. Tuesday, October 11, 2016 10
  • 11. Pseudo Code for RSA Algorithm  Key Generation Algorithm 1. Choose two very large random prime integers: p and q 2. Compute n and φ(n): n = pq and φ(n) = (p-1)(q-1) 3. Choose an integer e, 1 < e < φ(n) such that: gcd(e, φ(n)) = 1(where gcd means greatest common denominator) 4. Compute d, 1 < d < φ(n) such that: ed ≡ 1 (mod φ(n))  the public key is (n, e) and the private key is (n, d)  the values of p, q and φ(n) are private  e is the public or encryption exponent  d is the private or decryption exponent  Encryption The cyphertext C is found by the equation 'C = Me mod n' where M is the original message.  Decryption The message M can be found form the cyphertext C by the equation 'M = Cd mod n'. Tuesday, October 11, 2016 11
  • 12. Activity Diagram of RSA Algorithm Encryption Public Key Private Key Decryption Sender Receiver Generate Key To the public Cipher text Transmission Medium Plain text Plain text Tuesday, October 11, 2016 12
  • 13. Advantage: Increased security and convenience Private keys never need to be transmitted or revealed to anyone. Digital signatures that cannot be repudiated Authentication via secret-key systems requires the sharing of some secret and sometimes requires trust of a third party as well. As a result, a sender can repudiate a previously authenticated message by claiming the shared secret was somehow compromised) by one of the parties sharing the secret. Disadvantage: Encryption speed Slow For encryption, the best solution is to combine public- and secret-key systems in order to get both the security advantages of public-key systems and the speed advantages of secret-key systems. Such a protocol is called a digital envelope. Vulnerability risk A successful attack on a certification authority will allow an adversary to impersonate whomever he or she chooses by using a public-key certificate from the compromised authority to bind a key of the adversary's choice to the name of another user. Tuesday, October 11, 2016 13
  • 14. Further development proposal  Multiple encryption  Data storage method  Biometric security Tuesday, October 11, 2016 14
  • 15. Conclusion Cloud computing is changing the way IT departments buy IT. Businesses have a range of paths to the cloud, including infrastructure, platforms and applications that are available from cloud providers as online services. Security is a major requirement in cloud computing while we talk about data storage. There are number of existing techniques used to implement security in cloud. We discussed one symmetric and asymmetric algorithm. Our future will be considering some problems related to existing security algorithms and implement a better version of AES & RSA. Tuesday, October 11, 2016 15
  • 16. Left the world… Trapped me to answer the question of unknown Answers… Left silently *sigh*.. Don’t Ask Questions Please. Tuesday, October 11, 2016 16
  • 17. References  Randeep Kaur ,Supriya Kinger, “Analysis of Security Algorithms in Cloud Computing“, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 3, March 2014 .  http://www.emc.com/emc-plus/rsa-labs/standards- initiatives/advantages-and-disadvantages.htm  http://science.opposingviews.com/advantages- disadvantages-symmetric-key-encryption-2609.html Tuesday, October 11, 2016 17