Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Associate Professor Amrapali Institute of Management & Computer Applications, Haldwani ,Uttarakhand
2
ABSTRACT
With emergence of cloud computing for saving private data on the cloud, Data security over the network and internet has
become an challenge today and achieving good security means good methods used to save data in encrypted way. Therefore,
there is need of better encryption method with better efficiency in order to increase the security and authenticity and to
efficiently decrease computational complexity. Although there are many symmetric key algorithms, we proposed a two level
encryption Algorithm, which uses Symmetric key. This is an algorithm uses binary addition operation, a circular bit shifting
operation and folding method and a symmetric key cryptography .
Keywords: cloud data security; Symmetric key; random no; folding method ;cipher text; binary addition; circular bit
Shifting; Encryption; Decryption.
1. INTRODUCTION
Storing and sharing many confidential private and public data through the network and uses of internet, social network
and online storage are the day today routine task of the society. For storing data on centrally accessible location Storage
area network (SAT) is in practice besides this many crucial and confidential data is also saved in both private and
public cloud .Cryptography is a technique to secure data from unauthorized access when they transmitted over the
network. Cryptography achieves the security goals- confidentiality, integrity, authenticity and non-repudiation by two
operation called encryption and decryption
The original text(Plain Text) , which is to be send over the network, first transferred into a codified non understandable
text, called cipher text using some key (generally a set of values or string of symbols). This technique is known as
encryption. Decryption is just reverse operation of encryption where we retrieved the original text from the cipher text..
Cryptography has classified into Symmetric key cryptography and Asymmetric key cryptography depending on what
types of keys used
Page 53
Symmetric key cryptography is faster than the Asymmetric cryptography, and requirement of storage memory is less as
compared to the Asymmetric Key Cryptography. The proposed method not only encrypt the plain text to be transmitted
but also encrypt the secret key .
Page 54
4. CONCLUSION
The proposed algorithm uses a simple technique to encrypt the plain text, applying a binary addition Operation on the
character of the plain text twice. The algorithm is simple to understand and implement. A special attention has given
to secure the secret key better to say to secure the shared link using a circular bit shifting operation and folding method.
It is hard to decipher the key and to decrypt the ciphered text without knowing the proper key. Here we work with
string and 8 bit binary data and focused on symmetric key cryptography technique .the same can be applied on a large
character code like unicode and large key size (128 bit and 256 bit) to make it more secure.
REFERENCES
[1]. Sijie Guo, Jin Xiong, Weiping Wang, Rubao Lee Mastiff, A Map Reduce-based system for time based bigdata
analytics, in: 2012 IEEE International Conference on Cluster Computing, 2012,pp.7280.
[2]. Bingsheng He,WenbinFang,QiongLuo,NagaK.Govindaraju,TuyongWang,Mars:aMap Reduce framework on
graphics processors ,in: Proceedings of the17th International Conference on Parallel Architecture sand
Compilation Techniques ,PACT08,ACM, NewYork,NY,USA,2008, pp.260269.
Page 55
[3]. Shadi Ibrahim, Hai Jin, Bin Cheng, Haijun Cao, Song Wu, Li Qi, CLOUDLET: to wards Map Reduce
implementation on virtual machines ,in: Proceedings of the18th ACM International Symposium on High
Performance Distributed Computing,HPDC09,ACM,NewYork,NY,USA,2009,pp.6566.
[4]. Joanna Kolodziej, Fatos Xhafa, Integration of task a bortion and security requirements in GA-based metaheuristics for independent batch Grid schedul-ing,Comput.Math.Appl.63(2)(2012)350364.
[5]. L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner. A break in the clouds: towards a cloud definition,
in: ACM SIGCOMM Computer Communication Review, 2008.p.50-55.
[6]. M.B. Mollah, K.R. Islam, and S.S. Islam. Next generation of computing through cloud computing technology, in:
2012 25th IEEE Canadian Conference on Electrical Computer Engineering (CCECE), May 2012.p.1-6.
[7]. Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou. Achieving secure, scalable and fine-grained data access
control in cloud computing, in: IN-FOCOM, 2010 Proceedings IEEE, 2010.p.1-9.
[8]. A. Bialecki, M. Cafarella, D. Cutting, O. OMalley, Hadoop: A Framework for Running Applications on Large
Clusters Built of Commodity Hardware. <http://lucene.apache.org/hadoop>.
[9]. E Surya, C. Diviya. "A Survey on Symmetric Key Encryption Algorithm''. International Journal of Computer
Science & CommunicationNetworks, Volume 2(4), 475-477
[10]. Abderrahim, N., Benmansour, F., Seddiki, O., 2012. Integration of chaotic sequences uniformly distributed in a
new image encryption algorithm.Int. J. Comput. Science. (IJCSI) 9 (2).
[11]. Ahmed, H., Kalash, H., Farag Allah, O., 2007. An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for
image encryption and decryption.Informatica 31 (1), 121129.
[12]. Bashir, A., Basari, A., Almangush, H., 2012. Novel Image Encryption using an Integration Technique of Blocks
Rotation based on the Magic cubeand the AES Algorithm. Int J. Comput. Sci. 9
[13]. Boneh, D., Durfee, G., 2000. Cryptanalysis of RSA with private key d less than N. IEEE Trans. Inf. Theory 46 (4),
13391349.Burr, W., 2003. Selecting the advanced encryption standard. IEEE Security.
Books Referred
[14]. Behrouz A. Forouzan,. Cryptography & Network Security. Special Indian Edition, Tata McGraw-Hill,2007.
[15]. Atul Kahate. Cryptography and Network Security. Second Edition, Tata McGraw-Hill,2009.
[16]. W. Stallings. Cryptography and Network Security Principles and Practices. Fourth Edition, Pearson Education,
Prentice Hall,2009.
URL Referred
https://en.wikipedia.org/wiki/Cryptography
www.webopedia.com
ww2.valdosta.edu/~sfares/cs330/cs3410.a.hashing.fa8.html
computer.howstuffworks.com/encryption2.htm
Author
Dr. Mahesh Kumar Sharma is renowned academician of uttarakhand and PhD (CSE) in 2009.He has
more than 40 research paper and author of approximate ten books. He is supervisor for Phd in
Uttrakhand Technical University and Dev Sanskriti Vishvidhliya Haridwar, Uttarakhand. His area of
interest and research are use of cloud computing, mobile technology and ICT in e governance.
Pradeep Semwal is research Scholar at Uttrakhand technical university and presently working as
Assistant Professor at Shri Guru Ram Rai Institute of Technology & Science, Dehradun, India. He has
received his master in Computer Application degree from HNB Garhwal University, Uttarakhand,
India in 2002 and Master of Technology (M.Tech) from Karnataka Open University in 2010 ,M.Sc
(Statisitics) from HNB Garhwal University in 1999 and currently pursuing Ph.D from Uttarakhand
Technical University, Dehradun, India.
Page 56