0% found this document useful (0 votes)
36 views25 pages

Final Review

The document proposes a new effective lightweight homomorphic cryptographic algorithm for securing data in cloud computing. The algorithm uses a two-layer encryption approach, with the first layer being a new symmetric-key block cipher and the second layer applying homomorphic encryption based on RSA. The goal is to enhance data security for cloud users while meeting performance needs. Evaluation shows the proposed algorithm outperforms other lightweight and traditional cryptographic methods in terms of security and efficiency.

Uploaded by

Abith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views25 pages

Final Review

The document proposes a new effective lightweight homomorphic cryptographic algorithm for securing data in cloud computing. The algorithm uses a two-layer encryption approach, with the first layer being a new symmetric-key block cipher and the second layer applying homomorphic encryption based on RSA. The goal is to enhance data security for cloud users while meeting performance needs. Evaluation shows the proposed algorithm outperforms other lightweight and traditional cryptographic methods in terms of security and efficiency.

Uploaded by

Abith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Effective Lightweight Homomorphic

Cryptographic Algorithm for data


security in cloud computing

By
Guide
123003003 - Abitha A
Lavanya M
123003164 - Nila B
Asst.Prof III
123003220 - Sethana Shree P
AIM OF THE PROJECT

The Aim is to enhance growing need for cloud computing, security is


becoming important for both individuals and business need . The result of
the proposed algorithm outperforms another Lightweight Cryptographic
Algorithm, symmetric and asymmetric algorithm and also it meets the
C.I.A principle.

2
LITERATURE SURVEY
TITLE OF THE AUTHOR NAME ADVANTAGES OF THE DISADVANTAGES OF THE
PAPER PAPER PAPER
Design and M.A. Hossain, A. Ullah, The algorithm intents to come with some Encryption is that all parties involved in
Development of a Novel N.I. Khan, M.F. solutions that will reduce the security communication have to exchange the key
Symmetric Algorithm for Alam,2019 threats and ensure far better security to the used to encrypt the message before they can
Enhancing Data Security data stored in cloud and overcome some decrypt it.
in Cloud Computing security issue with the data stored in .

Hybrid encryption G. Viswanath, P.V. The proposed framework contains data Lack of Data Encryption Non-encrypted
framework for securing Krishna,2020 uploading, slicing, indexing, encryption, network transmissions and data are
big data storage in multi- distribution, decryption, retrieval and vulnerable to attacks,Poor Regulatory
cloud environment merging process. results prove the Compliance The adherence to compliance
superiority of the proposed algorithm and best practices becomes complicated
compared to the bench mark algorithms. when you use a DDOS Attack

Homomorphic M. Louk, H. Lim,2015 Data remains secure and private in Requires either application modifications or
encryption in mobile untrusted environments, like public clouds dedicated and specialized client-server
multi cloud computing or external parties. ...Eliminates tradeoff applications in order to make it work
between data usability and data privacy functionally. 3
LITERATURE SURVEY
TITLE OF THE AUTHOR ADVANTAGES OF THE PAPER DISADVANTAGES OF PAPER
PAPER NAME
Using Fully Homomorphic I. Jabbar,2016 Traditional encryption schemes to encrypt Partially Homomorphic Encryption (PHE)
Encryption to secure cloud the remoted data before sending to the cloud such as RSA and Paillier schemes are
computing provider has been most widely used insufficient to secure cloud computing
technique to bridge this security gap. because these schemes allow to perform
Homomorphic encryption allows to perform only one operation on the encrypted data
computations on encrypted data without of client.
decryption.

Security Techniques for data K. Jakimoski, 2016 The proposed techniques are suggested for The proposed work has a lot of issues that
protection in cloud computing data protection in cloud computing, they are should be considered in order to have
SSL (Secure Socket Layer) Encryption, improved data security in the cloud
Intrusion Detection System; Multi Tenancy computing, like proper usage of
based Access Control, etc. administrative privileges,data recovery and
boundary defense in the cloud.

Performance analysis of D. Chandravathi, This paper presents modified RSA (MRSA) The weakness of RSA lies in the generation
modified RSA and RSA D.P.V. encryption scheme clustering of prime of Prime numbers. This is achieved by a
Homomorphic encryption Lakshmi,2017 numbers for the generation of keys for new classification technique in modified
encryption and decryption is done which RSA (MRSA).
scheme for Cloud data fastens the process of encryption. 4
security.
LITERATURE SURVEY
TITLE OF THE AUTHOR NAME ADVANTAGES OF THE PAPER DISADVANTAGES OF THE
PAPER PAPER
Secure Cloud Computing Maha Tebaa, El Hajii,2019 Cloud Computing offers a number of These cloud providers must provide
through Homomorphic benefits and services to its customers who guarantees on the protection of privacy
Encryption pay the use of hardware ,software and sensitive data stored in their data
resources on demand which they can centers shared between multiple clients
access via internet without the need of a using the concept of virtualization.
large storage system capacity and without
paying any equipment maintenance fees

A novel cryptographic Ankit Dhamija, October 2015 Design for cloud architecture which There are large number of information,
and steganographic ensures secure data transmission from the huge file size, therefore someone can
approach for secure cloud client's organization to the servers of the suspect about it. If this approach is
data migration Cloud Service provider (CSP). We have gone in the wrong hands such as
used a combined approach of hackers, terrorist, criminals then this
cryptography and steganography because can be very much critical.
it will provide a two way security to the
data being transmitted on the network.

Secure User Data in Pronika, S.S.Tyagi, 2021 The proposed different security algorithms Proposed algorithms are helpful for past
Cloud Computing Using to eliminate the concerns regarding data requirement. In future several
Encryption algorithms loss. Algorithms like: RSA, DES, AES, comparisons with different approaches
Blowfish have been used ensure the and results to show effectiveness of
security of data on cloud proposed framework can be provided.
5
EXISTING SYSTEM METHODOLOGIES
Effective light weight homomorphic cryptographic algorithm contains two layers of
encryption.

FIRST LAYER: New effective light weight cryptographic algorithm.

 The first layer is built on a symmetric-key algorithm.

 The methods encrypt data with a 16-byte (128-bit) block cipher and a 16-byte (128-
bit) key to enhance the encryption’s complexity.

 A New Lightweight Cryptographic Algorithm for Security Data which might be


utilized to secure cloud computing systems.

6
EXISTING SYSTEM
METHODOLOGIES
SECOND LAYER:A Multiplicative Homomorphic Schemes which utilizes
properties of RSA.
 The second layer is based on asymmetric cryptography.

 The RSA algorithm’s multiplicative homomorphic feature is developed to


increase data security in cloud computing.

 The second layer method modifies RSA with homomorphic encryption


algorithm implementation which converts data into cipher text

7
WORK FLOW
ENCRYPTION PROCESS
DECRYPTION PROCESS

8
Key Generation Process
• The key is the critical component of the algorithm in the process of encryption
and decryption.
• The diffusion and confusion techniques used to generate the proposed algorithm
strengthen the key.
• The strength of key generation results in increased security, better encryption
complexity, and decreased knowledge of the key by attackers. Two keys will be
generated from the Key.
• The first will be used to decrypt the data, while the second will be used as an entry
key in the key expansion process.
• The key expansion requires a 128-bit length, and the key is split into seven sub-
keys (K1, K2, K3, K4, KK1, KK2, SK).

9
Encryption Process
• The technique used for converting data from an identifiable type into an
understandable form using diffusion and confusion strategies is named
cryptography.
• The encryption block process is the algorithm works on seven rounds to reduce
energy usage.
• Each round is based on basic arithmetic to increase the security rate .

10
F-Function
• The F-Function approach consists of numerous non-linear and linear operations
that ensure the complex dependence of output bits on input bits.
• This mechanism, referred to as confusion and diffusion.
• Confusion - Making relationship between encryption key and ciphertext as
complex as possible.
• Diffusion – Making each plaintext bit affect as many ciphertext bits as possible.

11
Output snapshots

12
Matlab Snapshots

Histogram of Plain
Image

Histogram of Cipher
Image
13
Matlab Snapshots
Correlation:

14
Comparison of Encryption time
we have compared various lightweight cryptographic algorithms and symmetric and
asymmetric algorithms with our proposed algorithm and we have calculated encryption time.

15
Comparison of Throughput and Time complexity
We have calculated the throughput and time complexity for our
proposed algorithm

Throughput

Time Complexity 16
Comparison of Block size, Key size, No of rounds

17
Cloud Storage by AWS S3 bucket using Django
We have created an AWS S3 bucket to download and upload the files using Django.

18
Choosing the encrypted image to upload into Amazon s3

19
Uploaded files using Django into Aws s3

20
Download Files from AWS s3

21
Image downloaded from AWS which is stored in AWS

22
Encrypted Image downloaded from AWS

23
Conclusion
The result of the proposed algorithm outperforms another Lightweight
Cryptographic Algorithm. (HIGHT,RC6) and some of the symmetric and
asymmetric algorithm (AES, BLOWFISH, HOMOMORPHIC
RSA,HOMOMORPHIC ELGAMAL) in regard to the size of the ciphertext,
encryption time, throughput, and security level. The Proposed Lightweight
Homomorphic Cryptographic algorithm with double layer gives more security and
encryption, decryption process is more faster than any other lightweight
cryptographic algorithms(Hight,RC6) and symmetric and asymmetric
algorithms(AES, Blowfish, Elgamal, DES,RSA). We have analysed the encryption
time,throughput, comparative analysis with lightweight cryptographic
algorithm(Hight, RC6) and implemented the upload and download of data from
AWS S3 using Django.

24
REFERENCE LINKS
• BASE PAPER LINK:
• https://reader.elsevier.com/reader/sd/pii/S2666603022000033?token=61
101D3B09AECD34A7BA181BD9125E46D2241EB0447D71FECEEF4
60D6FF976CAFF9A2FCA43E2B428490B3EAD6B31F1FC&originRe
gion=eu-west-1&originCreation=20230226065629
• REFERENCE LINKS:
• https://www.scirp.org/journal/paperinformation.aspx?paperid=95684
• https://arxiv.org/abs/1409.0829
• https://www.sciencepublishinggroup.com/journal/paperinfo?journalid=
238&doi=10.11648/j.iotcc.20160402.12

25

You might also like