International Journal of scientific research and management (IJSRM) \||Volume||3||Issue||4||Pages|| 2515-2518||2015|| Website: www.ijsrm.in ISSN (e): 2321-3418 Enhancement in OTP generation process for cloud data security using Diffie-Hellman and HMAC - A Review Komalpreet Kaur, Rohit Sethi mtech student lovely professional university. Phagwara Punjab 144411 [email protected] , Assistant Professor lovely professional university. Phagwara Punjab 144411 [email protected] ABSTARCT: Cloud Computing is a latest technology and used in every field where storing large amount of data is required. Security is the main problem while storing data. Encryption is used to protect the private data and provides the security in cloud computing. In this paper, the comparison between FHE and FDE is being carried out and a propose scheme is discussed which is used to enhance the security in cloud using OTP generation process in which Diffie-Hellman and HMAC is used to establish a secure channel between the user and the server. Keywords : Keywords: OTP, Diffie-Hellman, HMAC Vimmi Pandey (2013) introduces Dynamic mobile token 1. Introduction application. This is the application in mobile phones which is Cloud Computing is the environment which provides on- used to generate a code with the help of OTP (One Time demand and convenient access of the network to a computing Password) which is used only for one time to login session. To resources like storage, servers, applications, networks and the generate a OTP, there are two phases- Registration phase and other services which can be released minimum efficiency way Login phase. OTP is generated from the credentials filled by [1]. Cloud Service Provider plays an important role in cloud. the user. This code is valid for three minutes only. This ensures Users need not to buy software licenses or hardware to access protection against eavsdroppers attack and man-in-middle any service. Users demand services from CSP or ISP and can attack. Hence, they prove OTP is very secure. access the internet services. This reduces the customer’s Sanjoli Singla (2013) propose a design and architecture that expenditure and called “pay-per-use” service [7]. Example, can help to encrypt and decrypt the file at the user side which GMAIL and icloud, in which user can access their data provides data security in both cases while user is at rest or is anywhere anytime with the internet accessibility. Dropbox is a transferring data. service of cloud where any user either with premium account along with EAP-CHAP is used. Focus is on client side security (account with some extra features) or free account can use their in which only the authorized user can access the data. Even if cloud. There are some security threats in it. Security techniques some intruder (Unauthorized user) gets access of the data then are used to overcome these problems. the data will not be decrypt. Rijndael Encryption algorithm is In Cloud, there are three service models-Software as a Service used by the user to provide better security. (SaaS), Platform as a Service (PaaS), Infrastructure as a Dawn Song (2012) described the data-protection-as-a-service Service (IaaS) [6] and four deployment models- Public Cloud, where different services are provided for protecting data. Two Private Cloud, Hybrid Cloud, Community Cloud [1]. techniques have discussed- FDE (Full Disk Encryption) and For this, Rijndael Encryption Algorithm FHE (Fully Homomorphic Encryption). Both techniques are LITRATURE REVIEW compared on the basis of key management, sharing, and ease of Komalpreet Kaur, IJSRM volume 3 issue 4 April 2015 [www.ijsrm.in] Page 2516 development, maintenance, aggregation and performance. The scheme in which OTP is generated on the basis of Diffie key management and access control are moved by DpaaS Hellman and HMAC algorithms in which keys are managed (Data-Protection-as-a-service) approach for purpose of balance and shared by two users for the security of data. In this new easy maintenance and rapid development by user-side model, secure channel establishment algorithm will used for verification. key management and key sharing. The secure channel Young-Gi Min (2012) describes three service models and five establishment algorithm is Diffie- Hellman. In Diffie-Hellman layers in cloud computing. Different security attacks are algorithm if two parties, say, Master and Slave wishes to defined which need to be overcome by applying security exchange data. Before starting the communication, secure algorithms and another techniques. To have secured cloud channel is established. Both parties select their own random deployment, Encryption and key management, identity and number. On the basis of the selected random numbers, secure access management must be considered. The best way to channel and shared key is established. We have embedded the minimize the unauthorized access is using Digital ID’s for the Diffie Hellman key exchange algorithm for authentication employee; this also addresses the issue of non-repudiation. procedure. The new scheme will provide reliable key storage Simarjeet Kaur (2012) describes various data encryption and key management services. This will enhance the reliability schemes like homomorphic encryption, searchable and and security of the existing fully homomorphic encryption structured encryption, Identity based encryption, signature scheme. In our work, we are using Diffie-Hellman algorithm based encryption. These are emerging technique in cloud world for secure channel establishment and OTP for more security. It security to provide day night full protection to critical data is more secure than the existing OTP generation process. information. Shui Han (2011) introduces third party auditor in which the CONCLUSION user can operate and store their data securely in cloud. The FHE is more secure and reliable then FDE. Security in cloud is third party auditor provides techniques like RSA and Bilinear enhanced by using OTP (One Time Password). In existing Diffie-Hellman. By using RSA algorithm, encrypted data is paper, methodology of OTP is defined. By this methodology of flow from sender to the receiver and by using Bilinear Diffie- generating OTP, brute force attack is possible which is no more Hellman; secure channel is established between the user and secure. We proposed a new model of generating OTP by using the sender. With the exchanging of keys, data is always sent to Diffie Hellman and HMAC which is more secure. Diffie the valid and authorized users only. Hellman and HMAC establish a secure channel between user and the server. PROPOSED METHODOLOGY FHE and FDE are two encryption schemes which provide more security in the cloud. FHE and FDE are compared on the basis of some factors- Key management and Trust, Sharing, Aggregation, Performance, Ease of development and References [1] Bhavna Makhija, V. G. (2013). Enhanced Data Security in Cloud Computing with Third Party Audito. International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345 . Maintenance. From these factors, it is concluded that FHE is more reliable. It gives more privacy and security as compare to [2] Dawn Song, E. S. (2012). Cloud Data Protection for the Masses. IEEE Computer Society, pp 39-45 . FDE. The main problem in Fully Homomorphic Encryption is key sharing and key management. To solve the problem of Key management and Key Sharing, third party auditor is introduced. The main advantage of this is that cloud service provider can offer the functions which were provided by the traditional third party auditor and make it trustful. The third party auditing [3] Deyan Chen, H. Z. (2012). Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering, pp 647-651 . [4] Kaur, S. (2012). Cryptography and Encryption In Cloud Computing. VSRD-IJCSIT, Vol. 2 (3), 2012, 242-249, pp 242249 . scheme will be failed, if the third party’s security is compromised. To solve this problem, we proposed a new Komalpreet Kaur, IJSRM volume 3 issue 4 April 2015 [www.ijsrm.in] Page 2517 [5] Pandey, V. (2013). Securing the Cloud Environment Using OTP. International Journal of Scientific Research in Computer Science and Engineering . [6] Sanjoli Singla, J. S. (2013). Cloud Data Security using Authentication and Encryption Technique. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 22322235 [7] Sean Carlin, K. C. (2011). Cloud Computing Security. International Journal of Ambient Computing and Intelligence, pp 14-19 . [8] Shui Han, J. X. (2011). Ensuring Data Storage Through A Novel Third Party auditor Scheme in Cloud Computing. IEEE computer science & Technology, pp 264-268 [9] Young-Gi Min, H.-J. S.-H. (2012). Cloud Computing Security Issues and Access Control Solutions. Journal of Security Engineering, pp 135-140 . Profile Komalpreet Kaur is student of Lovely Professional University, Jalandhar (INDIA). She has received B.Tech Degree from Lovely Professional University, Jalandhar. Her main research interest includes networking. Komalpreet Kaur, IJSRM volume 3 issue 4 April 2015 [www.ijsrm.in] Page 2518
© Copyright 2024