CFP last date
20 December 2024
Reseach Article

Light Weight Encryption Technique for Group Communication in Cloud Computing Environment

by Dinesh C. Verma, A. K. Mohapatra, Kaleem Usmani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 8
Year of Publication: 2012
Authors: Dinesh C. Verma, A. K. Mohapatra, Kaleem Usmani
10.5120/7649-0743

Dinesh C. Verma, A. K. Mohapatra, Kaleem Usmani . Light Weight Encryption Technique for Group Communication in Cloud Computing Environment. International Journal of Computer Applications. 49, 8 ( July 2012), 35-41. DOI=10.5120/7649-0743

@article{ 10.5120/7649-0743,
author = { Dinesh C. Verma, A. K. Mohapatra, Kaleem Usmani },
title = { Light Weight Encryption Technique for Group Communication in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 8 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 35-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number8/7649-0743/ },
doi = { 10.5120/7649-0743 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:45.846686+05:30
%A Dinesh C. Verma
%A A. K. Mohapatra
%A Kaleem Usmani
%T Light Weight Encryption Technique for Group Communication in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 8
%P 35-41
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a typical example of distributed computing and emerged as a new paradigm that moves computing and data away from desktop and portable PCs into large data centers. Cloud services have three broad categories based on the fundamental nature of the cloud-based solution they provide: infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), or software-as-aservice (SaaS). In this work we have focused on the SaaS services provided by the Cloud service providers (CSP). The issue with SaaS is data security and confidentiality that makes the cloud user reluctant towards the cloud services. Data confidentiality can be achieved by encrypted outsourced content before outsourcing to cloud servers. But due to excessive computation of existing cryptographic algorithms and distributed nature of cloud computing, there is a need of a light weight cryptographic technique that has less computational overhead and high throughput. In this paper a light weight encryption technique is proposed which has less computational time and overall good performance. In order to prove it, the proposed algorithm is compared with the existing encryption techniques and results are analyzed. The key distribution of the shared key and secret key between the two group members is also handled efficiently using the same algorithm. Enormous overhead due to the large key size has been effectively ruled out in this paper. Light weight nature of proposed algorithm is well suited for distributed nature of cloud servers for an efficient processing with greatly enhanced user's confidence in cloud computing.

References
  1. Mehmet Yildiz et. al. , "A Layered Security Approach for Cloud Computing Infrastructure", 10th IEEE International Symposium on Pervasive Systems, Algorithms, and Networks, pp 763-767.
  2. Anthony T. Velte, Toby J. Velte Robert Elsenpeter "Cloud Computing A Practical Approach" Tata McGRAW-HILL EDITION, pp 35.
  3. Ik Rae Jeong et al. , "Constructing PEKS schemes secure against keyword guessing attacks is possible?", Elsevier Computer Communications 32 (2009) 394–396.
  4. Bo Zhang et al. , "An efficient public key encryption with conjunctive-subset keywords search", Elsevier Journal of Network and Computer Applications 34 (2011) 262–267.
  5. Ji Hu, Andreas Klein, "A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud", 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE Computer Spciety, pp 735-740.
  6. G. Russello et al. , "providing data confidentiality against malicious hosts in shared data spaces", Elsevire Science of computer programming 75(2010) 426-439
  7. S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Elsevier Journal of Network and Computer Applications 34, 2011, pp 1-11
  8. Weichao Wang et. al. , "Secure and Efficient Access to Outsourced Data", CCSW'09, November 13, 2009, ACM, pp. 55-64.
  9. L. Grossman, "The case for cloud computing", IEEE Journal computer. org/ITPro, March/April 2009, pp 23-27
  10. Kai Hwang, Deyi Li, "Trusted Cloud Computing with Secure Resources and Data Coloring "IEEE INTERNET COMPUTING 2010, Pg 14-22
  11. Patrick McDaniel, Sean W. Smith, "Outlook: Cloudy with a Chance of Security Challenges and Improvements" IEEE computer and reliability societies, January/February 2010, pp 77-80
  12. Shyam Kumar Doddavula, Amit Wasudeo Gawande, "SETLabs briefings on business innovation through technology", Infosys Research, Vol 7 No. 7, pp 14.
  13. Michael Armbrust, Armando Fox et. al. , "A View of Cloud Computing", communications of the ACM April 2010, vol. 53 no. 4, pp 50-58.
  14. Mark Townsend, "Managing a Security Program in a Cloud Computing Environment", ACM InfoSecCD '09, September 25-26, 2009, pg 128-133
  15. Kevin Hamlen et al. , " Security Issues for Cloud Computing", International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010
  16. Richard Chow at. Al. , "Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control", CCSW'09, ACM, November 13, 2009, pp 85-90
  17. William Stallings,"Cyptography and Network Security: Principal and Practices", Forth Edition, Pearsons Prentice Hall.
  18. Qin Liu et al. , "Secure and privacy preserving keyword searching for cloud storage services" Journal of Network and Computer Applications, Elsevier, 2011.
  19. Seny Kamara and Kristin Lauter, "Cryptographic Cloud Storage", LNCS 6054, Springer, 2010, pp. 136-149.
  20. Qi Zhang, Lu Cheng, Raouf Boutaba," Cloud computing: state-of-the-art and research challenges", J Internet Serv Appl (2010) 1, Springer, pp 7–18
  21. Dan Lin, Anna Squicciarini, "Data Protection Models for Service Provisioning in the Cloud", SACMAT'10, June 9–11, 2010, ACM, pp 183-192.
  22. S. Creese et al. , "Data Protection-Aware Design for Cloud Services", CloudCom 2009, Springer LNCS 5931, pp. 119–130, F009.
  23. Yao Chen, Radu Sion, "On Securing Untrusted Clouds with Cryptography", WPES'10, October 4, 2010, Chicago, ACM, pp 109-114.
  24. Christian Henrich et el. , "Brief Announcement: Towards Secure Cloud Computing" Springer, SSS 2009, LNCS 5873, pp. 785–786, 2009.
  25. Diaa Salama Abd Elminaam et al. , "Evaluating The Performance of Symmetric Encryption Algorithms", International Journal of Network Security, Vol. 10, No. 3, PP. 216–222, May 2010.
  26. Li Xiong et al. , "Adaptive, Secure, and Scalable Distributed Data Outsourcing: A Vision Paper ", ACM 3DAPAS'11, June , 2011
  27. Jin Wook Byun et al. , "On a security model of conjunctive keyword search over encrypted relational database", The Journal of Systems and Software 84 (2011) 1364–1372.
  28. Dong Yuan et al. , "A data placement strategy in scientific cloud workflows", Elsevier Future Generation Computer Systems 26 (2010) 1200-1214.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed computing Cloud computing Encryption Software as a service (SaaS) Data security