• Tidak ada hasil yang ditemukan

View of SECURE CLOUD ENCRYPTION BASED ON ADVANCED ENCRYPTION STANDARD (AES)

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of SECURE CLOUD ENCRYPTION BASED ON ADVANCED ENCRYPTION STANDARD (AES)"

Copied!
6
0
0

Teks penuh

(1)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

44

SECURE CLOUD ENCRYPTION BASED ON ADVANCED ENCRYPTION STANDARD (AES) Avinash Panthi, (M.Tech Scholar)

Guide - Abhishek Mathur, (Assistant Professor) Deptt. - Computer Science Engineering

Samrat Ashok Technological Institute

Abstract - The increased number of communications is expected to generate mountains of data and the security of data can be a threat. The various devices in the architecture are essentially smaller in size and low powered. Previous encryption algorithms are generally computationally expensive due to their complexity and requires many rounds to encrypt, essentially wasting the constrained energy of the gadgets. Less complex algorithm, it may compromise the desired integrity. In this dissertation we propose a encryption algorithm. It is a 64-bit block cipher and requires 64-bit key to encrypt the data. In secure systems the confidentiality of the data is maintained and it is made sure that during the process of message exchange the data retains its originality and no alteration is unseen by the system.

Simulations result shows the algorithm provides substantial security in just few encryption rounds. After the generation of round keys the encryption process can be started. For the purpose of creating confusion and diffusion this process is composed of some logical operations. To test the security strength of the proposed algorithm, the algorithm is evaluated on the basis of the following criterion. Key sensitivity, entropy and correlation of the image.

Keyword: Advanced Encryption Standard (AES) Data Encryption Standard (DES).

1. INTRODUCTION A. Secure Architecture

The most basic level is the perceptual layer (also known as recognition layer), which collects all kinds of information through physical equipment and identifies the physical world, the information includes object properties, environmental condition etc; The key component in this layer is sensors for capturing and representing the physical world in the digital world.

The second level is network layer.

Network layer is responsible for the reliable transmission of information from perceptual layer, initial processing of information, classification and polymerization. In this layer the information transmission is relied on several basic networks, which are the internet, mobile communication network, satellite nets, wireless network, network infrastructure and communication protocols are also essential to the information exchange between devices.

The third level is support layer.

Support layer will set up a reliable support platform for the application layer, on this support platform all kind of intelligent computing powers will be organized through network grid and cloud computing. It plays the role of combining

application layer upward and network layer downward.

The application layer is the topmost and terminal level. Application layer provides the personalized services according to the needs of the users. Users can access to the internet of thing through the application layer interface using of television, personal computer or mobile equipment and so on.

Network security and management play an important role in above each level.

Then we will analysis the security features.

B. Security Features

a. Perceptual Layer: Usually perceptual nodes are short of computer power and storage capacity because they are simple and with less power.

Therefore, it is unable to apply frequency hopping communication and public key encryption algorithm to security protection. And it is very difficult to set up security protection system. Meanwhile attacks from the external network such as deny of service also bring new security problems. In the other hand sensor data still need the protection for

(2)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

45 integrity, authenticity and

confidentiality.

b. Network Layer: Although the core network has relatively complete safety protection ability, but Man-in- the-Middle Attack and counterfeit attack still exist, meanwhile junk mail and computer virus cannot be ignored, a large number of data sending cause congestion. Therefore, security mechanism in this level is very important to the AES.

c. Support Layer: Do the mass data processing and intelligent decision of network behavior in this layer, intelligent processing is limited for malicious information, so it is a challenge to improve the ability to recognize the malicious information.

d. Application Layer: In this level security needs for different application environment are different, and data sharing is that one of the characteristics of application layer, which creating problems of data privacy, access control and disclosure of information

C. AES

The AES cipher Like DES, AES is a symmetric block cipher. This means that it uses the same key for both encryption and decryption. However, AES is quite different from DES in a number of ways.

The algorithm Rijndael allows for a variety of block and key sizes and not just the 64 and 56 bits of DES’ block and key size.

The block and key can in fact be chosen independently from 128, 160, 192, 224, 256 bits and need not be the same.

However, the AES standard states that the algorithm can only accept a block size of 128 bits and a choice of three keys - 128, 192, 256 bits. Depending on which version is used, the name of the standard is modified to AES-128, AES-192 or AES256 respectively. As well as these differences AES differs from DES in that it is not a feistel structure. Recall that in a feistel structure, half of the data block is used to modify the other half of the data block and then the halves are swapped. In this case the entire data block is processed in parallel during each round using substitutions and permutations. A number of AES parameters depend on the

key length. For example, if the key size used is 128 then the number of rounds is 10 whereas it is 12 and 14 for 192 and 256 bits respectively. At present the most common key size likely to be used is the 128 bit key.

The security of information and network should be equipped with these properties such as identification, confidentiality, integrality and undesirability. Different from internet, the AES will be applied to the crucial areas of national economy, e.g., medical service and health care, and intelligent transportation, thus security needs in the AES will be higher in availability and dependability.

Fig 1.1 AES Design 1.1 Encryption Process

The encryption process is initiated once the keys generated by the key expansion block are securely received by the encoder through the secure communication channel created by using the LEAP protocol. In the encryption process, simple operations, which include AND, OR, XOR, XNOR, left shift (LS), substitution (S boxes) and swapping operations, are performed to create confusion and diffusion.

Table 1.1 AND, OR, and left shift (LS) operation. Adopted

Data Set Input Image

(3)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

46 Fig 1.2 Input Image.

The major purpose of this function is to change the original position of data to get more complex cipher. Sub keys (K1, K2, K3, K4, K5) are XNOR with the left and right half of each round respectively. The output of each round becomes the input of next round as well as it is mapped with the F-function. F-function involves substitution (S boxes), AND, OR, and left shift (LS) operation.

The plain text (X) is a linear array of 64 bits, which is divided in to two half’s of 32 bits and each 32 bit half is further sub-divided into two half’s of 16 bits . In each round swapping of 16 bit blocks are performed.

Fig 1.3 Encryption Process

Fig 1.4 Proposed Encryption Model

Fig 1.5 Decryption process The output from the F function is then XOR with the swapped 16 bits of the same round resulting in confusion of data. This brings the end to the encryption process. The decryption process is just the reserved of the procedure described above

1.2 Type of Classes

1. Triple DES -Triple DESwas designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the

(4)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

47 recommended standard and the most

widely used symmetric algorithm in the industry.

2. RSA -RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the methods used in our PGP and GPG programs.

3. Blowfish-Blowfish is yet another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually.

4. Two fish- Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Two fish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.

5. AES-The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations. It is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes.

1.3 AES Algorithm

 AES Encryption Algorithm is a Symmetric Algorithm

 Cryptography means same Encryption key is used for Encryption Process and for Decryption Process.

 Before sending the content, the receiver should have Encryption Key which receiver can have from a secure and reliable medium

 Where Plaintext is Unencrypted Content which can be accessed by anyone. While Ciphertext represents Encrypted Content for privacy.

 The AES Algorithm is made of 3 Block Ciphers AES-128, AES-192 and AES-256. These Block Ciphers are used to encrypt the Data Block of 128 bit.

 AES-128 Block CIpher uses the 128- bits Encryption Key

Fig 1.6 AES Algorithm Working

1.4 Result Discussion With Description An encryption algorithm discussed in base paper is composed of several computational rounds that may occupy significant memory making it unsuitable to be utilized in AES encryption. The proposed algorithm is evaluated in terms of its memory utilization

The proposed algorithm utilizes the 22 bytes of memory on AT mega 328 platform While for DNA encryption the software environment is MATLAB2014a,

The hardware environment is the win7 system, the processor is i5, the RAM is 4GB, and the hard disk is PC with 500G.

With the above simulation environment, simulation and analysis are carried out for the secret key, the entropy of information, the anti-differential ability, and the ability against statistical attack.

Proposed work based on AES has five rounds of calculation which makes proposed method better than DNA based image Encryption.

The execution time is found to be 0.188 milliseconds and 0.187 milliseconds for encryption and decryption respectively which is less than DNA based methodology which has more rounds consumes more time.

DNA encryption gets the entropy of information: 7.9979 which is closed to AES based entropy around 7.9977 but memory cost and run time consume more than AES.

Fig 1.7 AES Based image Encryption Decryption Process

Calculating the Encrypted and Original image's Entropy

Elapsed time is 6.628112 seconds.

Re =

7.3299 7.9900

(5)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

48 2 RESULT COMPARISON

Fig 1.8 Histogram Representation 3 COMPARISON AMONG VARIOUS CRYPTOGRAPHIC ALGORITHMS

Factors DES AES RSA ECC

Key

Length 56-bits 128,192,

256 bits based on no. of n=p*q

135 bits Block

Size 64-bits 128 bits variant varian t Security

Rate not

enoug h

excellent good less

Execution

Time slow faster slowest fastest

4 CONCLUSION

The communication is expected to generate data and the security of data can be a threat. The devices in the architecture are smaller in size and low powered. Old encryption algorithms are generally computationally found expensive due to their complexity and requires many rounds to encrypt,

essentially wasting the constrained energy of the gadgets. Less complex algorithm, Simulations result shows the algorithm provides substantial security in just five encryption rounds. The proposed algorithm is evaluated on the basis of the following criterion. Key sensitivity, effect of cipher on the entropy, correlation of the image. We tested the algorithm for computational resource utilization and computational complexity. We observe the memory utilization and total computational time utilized by the algorithm for the key generation, encryption and decryption. The required hardware implementation of the algorithm is done on a Motorola based 64-bit micro- controller for higher speed.

5 FUTURE WORK

While price and ease of use are two nice advantages of cloud computing, there are important security issues that need to be addressed when considering moving crucial applications and sensitive information to public and shared cloud environments. To handle these issues, the cloud supplier should develop sufficient controls to provide a similar or greater security than the organization would have if the cloud facility was not used. Security is a vital side of cloud computing.

Resources may be shared however the extent of user authorization varies. Files may be uploaded in encrypted form and using the concept of keys may be downloaded.

REFERENCES

1. KONG Liuyong, LI Lin “A new image encryption algorithm based on Chaos Proceedings of the 35th Chinese Control Conference July 27-29, 2016,

2. J. Romero-Mariona, R. Hallman, M. Kline, J.

San Miguel, M. Major, and L. Kerr, “Security in the industrial internet of things,” 2016.

3. G. Ho, D. Leung, P. Mishra, A. Hosseini, D.

Song, and D. Wagner, “Smart locks: Lessons for securing commodity internet of things devices,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 2016, pp.

461–472

4. D. Airehrour, J. Gutierrez, and S. K. Ray,

“Secure routing for internet of things: A survey,” Journal of Network and Computer Applications, vol. 66, pp. 198–213, 2016.

5. P. Zhao, T. Peffer, R. Narayanamurthy, G.

Fierro, P. Raftery, S. Kaam, and J. Kim,

“Getting into the zone: how the internet of things can improve energy efficiency and Parameter

selection Base

paper AES

encryption Proposed AES Performanc

e Entropy 7.997

9 7.9977 Satisfactory (almost

equal) Correlation 0.015

2(High )

0.0015

(low) Excellent

Memory cost

RAM4 G(Cos t High)

ATmega328 Low cost

Excellent

(6)

VOLUME: 07, Issue 07, Paper id-IJIERM-VII-VII, September 2020

49 demand response in a commercial building,”

2016.

6. S. Misra, M. Maheswaran, and S. Hashmi,

“Security challenges and approaches in internet of things,” 2016.

7. H. J. Ban, J. Choi, and N. Kang, “Fine- grained support of security services for resource constrained internet of things,”

International Journal of Distributed Sensor Networks, vol. 2016, 2016.

8. P. L. L. P. Pan Wang, Professor Sohail Chaudhry, S. Li, T. Tryfonas, and H. Li, “The internet of things: a security point of view,”

Internet Research, vol. 26, no. 2, pp. 337–

359, 2016.

9. F. Xie and H. Chen, “An efficient and robust data integrity verification algorithm based on context sensitive,” way, vol. 10, no. 4, 2016.

10. M. A. Simplicio Jr, M. V. Silva, R. C. Alves, and T. K. Shibata,“Lightweight and escrow- less authenticated key agreement for the internet of things,” Computer Communications, 2016

11. R. Want and S. Dustdar, “Activating the internet of things [guest editors’

introduction],” Computer, vol. 48, no. 9, pp.

16–20, 2015.

12. M. Ebrahim, S. Khan, and U. Khalid,

“Security risk analysis in peer 2 peer system;

an approach towards surmounting security challenges,” arXiv preprint arXiv:1404.5123, 2014

13. S. Wang, Z. Zhang, Z. Ye, X. Wang, X. Lin, and S. Chen, “Application of environmental internet of things on water quality management of urban scenic river,”

International Journal of Sustainable Development & World Ecology, vol. 20, no. 3, pp. 216–222, 2013.

14. Z. Pang, Q. Chen, J. Tian, L. Zheng, and E.

Dubrova, “Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things,” in Advanced Communication Technology

(ICACT), 2013 15th International Conference on. IEEE, 2013, pp. 529–534.

15. B. Karakostas, “A dns architecture for the internet of things: A case study in transport logistics,” Procedia Computer Science, vol. 19, pp. 594–601, 2013.

16. H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: a review,” in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3. IEEE, 2012, pp. 648–

651.

17. D. Miorandi, S. Sicari, F. De Pellegrini, and I.

Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.

18. Y. Li, M. Hou, H. Liu, and Y. Liu, “Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of internet of things,”

Information Technology and Management, vol. 13, no. 4, pp. 205–216, 2012.

19. M. C. Domingo, “An overview of the internet of things for people with disabilities,” Journal of Network and Computer Applications, vol. 35, no. 2, pp. 584–596, 2012.

20. H. Zhou, B. Liu, and D. Wang, “Design and research of urban intelligent transportation system based on the internet of things,” in Internet of Things. Springer, 2012, pp. 572–

580.

21. L. Da Xu, “Enterprise systems: state-of-the- art and future trends,” IEEE Transactions on Industrial Informatics, vol. 7, no. 4, pp. 630–

640, 2011.

22. W. Qiuping, Z. Shunbing, and D. Chunquan,

“Study on key technologies of internet of things perceiving mine,” Procedia Engineering, vol. 26, pp. 2326–2333, 2011.

23. L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.

Referensi

Dokumen terkait

The project is related to the process of Encryption and Decryption of a plaintext using Advanced Encryption Standards (AES) algorithm, modelled in Xilinx System Generator..

Pada penelitian ini aplikasi yang akan dibangun menggunakan algoritma Advanced Encryption Standard (AES) untuk melakukan proses enkripsi dan dekripsi gambar.. 3.2

Dalam penelitian ini penulis memilih algoritma Advanced Encryption Standard (AES) untuk diimplementasikan pada proses enkripsi dan dekripsi gambar.. Dari hasil penelitian penulis

Tujuan dari penelitian ini adalah membangun suatu aplikasi yang dapat mengamankan file gambar dengan menggunakan algoritma Advanced Encryption Standard (AES).... 1.5

Pada kesimpulan mengenai penulisan yang berjudul “Implementasi Pengamanan Data Pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES)”,

Penelitian ini mengimplementasikan algoritma kriptografi AES 128, Vigenere Cipher, dan metode steganografi LSB untuk menyembunyikan sebuah pesan dalam bentuk teks

ENHANCING ADVANCED ENCRYPTION STANDARD AES S-BOX GENERATION USING AFFINE TRANSFORMATION 1NUR HAFIZA ZAKARIA, 2RAMLAN MAHMOD, 3NUR IZURA UDZIR, 4ZURIATI AHMAD ZUKARNAIN 1Faculty of

Implementasi Kriptografi Menggunakan Algoritma Advanced Encryption Standard Aes Dengan Metode Cbc Chiper Block Chaining Dan Pengecekan Error Detection Cyclic Redundancy Check Jika