Data Privacy and Security in Cloud Environment Using Cryptography Approach

Authors

  • Jayashree Agarkhed Professor, Department of C.S.E, Poojya Doddappa Appa College of Engineering, Kalaburagi, Karnataka, India
  • R. Ashalatha Research Scholar, Department of C.S.E, Poojya Doddappa Appa College of Engineering, Kalaburagi, Karnataka, India

DOI:

https://doi.org/10.51983/ajcst-2018.7.1.1830

Keywords:

Confidentiality, Cloud storage, Cryptography, Privacy preserving, Security

Abstract

Cloud computing environment is a network centered computing technique delivered to the users as a service. It mainly involves computing over the network where the program file or any application, run upon server in various locations at the identical time. Cloud computing accommodates huge data storage and computing capabilities to its users. The cloud storage service is considered to be the best quality cloud maintenance service. Cryptography is known as the skill of securing the confidential information from third party hackers. Both the parties over the insecure network can transfer files with each other by the ways of cryptographic techniques of the sensitive data files for maintaining the security and also privacy. The secrecy and concealment of data are considered an important issue of concern in cloud field.

References

C. Liu, X. Zhang, C. Yang, and J. Chen, "CCBKE—Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing," Future Generation Computer Systems, vol. 29, no. 5, pp. 1300-1308, 2013.

X. Dong, J. Yu, Y. Luo, Y. Chen, G. Xue, and M. Li, "Achieving an Effective, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing," Computers & Security, vol. 42, pp. 151-164, 2014.

Y. Cheng, J. Ren, Z. Wang, S. Mei, and J. Zhou, "Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control," in Cloud and Green Computing (CGC), 2nd International Conference, IEEE, pp. 180-186, November, 2012.

C. Yao, L. Xu, and X. Huang, "A Secure Cloud Storage System from Threshold Encryption," in Intelligent Networking and Collaborative Systems (INCoS), 5th International Conference, IEEE, pp. 541-545, September 2013.

K. Gai, M. Qiu, H. Zha, and J. Xiong, "Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing," in Cyber Security and Cloud Computing (CSCloud), 3rd International Conference, IEEE, pp. 273-278, June 2016.

P. K. Arya, K. Selvamani, and S. Kanimozhi, "An Authentication Approach for Data Sharing in Cloud Environment for Dynamic Group," in Issues and Challenges in Intelligent Computing Techniques (ICICT), International Conference, IEEE, pp. 262-267, February, 2014.

X. Fu and Z. Wu, "Ciphertext Policy Attribute Based Encryption with Immediate Attribute Revocation for Fine-Grained Access Control in Cloud Storage," in Communications, Circuits and Systems (ICCCAS), International Conference, IEEE, vol. 2, pp. 103-108, November, 2013.

G. L. Prakash, M. Prateek, and I. Singh, "Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques," in Recent Advances and Innovations in Engineering (ICRAIE), IEEE, pp. 1-6, May 2014.

A. Dadhich, A. Gupta, and S. Yadav, "Swarm Intelligence based Linear Cryptanalysis of Four-Round Data Encryption Standard Algorithm," in Issues and Challenges in Intelligent Computing Techniques (ICICT), International Conference, IEEE, pp. 378-383, February 2014.

S. K. Sood, "A Combined Approach to Ensure Data Security in Cloud Computing," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831-1838, 2012.

U. Arjun and S. Vinay, "A Short Review on Data Security and Privacy Issues in Cloud Computing," in Current Trends in Advanced Computing (ICCTAC), IEEE International Conference, IEEE, pp. 1-5, March, 2016.

J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, and R. Buyya, "Ensuring Security and Privacy Preservation for Cloud Data Services," ACM Computing Surveys (CSUR), vol. 49, no. 1, pp. 13, 2016.

S. Dara, "Cryptography Challenges for Computational Privacy in Public Clouds," in Cloud Computing in Emerging Markets (CCEM), International Conference, IEEE, pp. 1-5, October 2013,.

N. Nalini and G. R. Rao, "Cryptanalysis of simplified data encryption standard via optimization heuristics," in Intelligent Sensing and Information Processing, ICISIP, 3rd International Conference, IEEE pp. 74-79, December 2005.

E. F. Schaefer, "A Simplified Data Encryption Standard Algorithm. Cryptologia, vol. 20, no. 1, pp. 77-84, 1996.

A. Nagamalli, S. S. Krishna, and B. KeerthiPriya, "Data Encryption using Counting Bloom Filters for Cloud Security," 2013.

E. Biham and A. Shamir, "Differential Cryptanalysis of the Data Encryption Standard," Springer Science & Business Media, 2012.

N. Jayapandian, A. M. Z. Rahman, S. Radhikadevi, and M. Koushikaa, "Enhanced Cloud Security Framework to Confirm Data Security on Asymmetric And Symmetric Key Encryption," in Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), World Conference, IEEE, pp. 1-4, Feb. 2016.

E. M. Mohamed, S. El-Etriby, and H. S. Abdul-kader, "Randomness Testing of Modern Encryption Techniques in Cloud Environment," in Informatics and Systems (INFOS), 8th International Conference, IEEE, pp. CC-1, May 2012.

B. Yang, K. Wu, and R. Karri, "Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard," In Test Conference, Proc. ITC International, IEEE, pp. 339-344, October 2004.

S. Landau, "Standing the test of time: The data encryption standard," Notices of AMS, vol. 47, no. 3, pp. 341-349, 2000.

M. E. Smid and D. K. Branstad, "Data Encryption Standard: Past and Future, Proc. of the IEEE, vol. 76, no. 5, pp. 550-559, 1988.

R. Davis, "The Data Encryption Standard in Perspective," IEEE Communications Society Magazine, vol. 16, no. 6, pp. 5-9, 1978.

I. Fister Jr, X. S. Yang, I. Fister, J. Brest, and D. Fister, "A Brief Review of Nature-Inspired Algorithms for Optimization," arXiv preprint arXiv:1307.4186, 2013.

G. Nithya and G. Jayapratha, "A Multi-agent Brokering Approach and Jumper Firefly Algorithm for Job Scheduling in Cloud Computing," in Intelligent Computing Applications (ICICA), 2014 International Conference, IEEE, pp. 52-58, March 2014.

X. S. Yang, "Firefly Algorithm, Stochastic Test Functions and Design Optimisation," International Journal of Bio-Inspired Computation, vol. 2, no. 2, pp. 78-84, 2010.

A. Gálvez and A. Iglesias, "Firefly Algorithm for Explicit B-Spline Curve Fitting to Data Points," Mathematical Problems in Engineering, 2013.

X. S. Yang, "Firefly Algorithms for Multimodal Optimization," in International Symposium on Stochastic Algorithms, Springer, Berlin, Heidelberg, pp. 169-178, October 2009.

T. Kanimozhi and K. Latha, "An Integrated Approach to Region Based Image Retrieval using Firefly Algorithm and Support Vector Machine," Neurocomputing, pp.1099-1111, 2015.

S. Su, Y. Su, F. Shao, and H. Guo, "A Power-Aware Virtual Machine Mapper using Firefly Optimization," in Advanced Cloud and Big Data, 3rd International Conference, IEEE, pp. 96-103, October, 2015.

Downloads

Published

18-02-2018

How to Cite

Agarkhed, J., & Ashalatha , R. (2018). Data Privacy and Security in Cloud Environment Using Cryptography Approach. Asian Journal of Computer Science and Technology, 7(1), 50–54. https://doi.org/10.51983/ajcst-2018.7.1.1830