Cloud Computing Security Using Cryptographic Algorithms

Authors

  • K. Srilakshmi Research Scholar, Department of Computer Science, Sri Padmavati Mahila Visva Vidyalayam, Tirupati, Andhra Pradesh, India
  • P. Bhargavi Assistant Professor, Department of Computer Science, Sri Padmavati Mahila Visva Vidyalayam, Tirupati, Andhra Pradesh, India

DOI:

https://doi.org/10.51983/ajcst-2019.8.S3.2082

Keywords:

Cloud Computing, Data Security Challenges, Cryptographic Algorithms

Abstract

Cloud computing is a new and fast emergent technology in field of computation and data storage as a service at very eye-catching facilities. It provides fast and well organized on demand services for storage, network, software, and hardware through the Internet. Applications that run in the cloud can balance various elements comprising load balancing, bandwidth, security and size of data. Major problems to cloud adoption are data privacy and security, because the data owner and the service provider are not within the similar trusted domain. Safety issues are increasingly significant in lowest layer Infrastructure as a Service (IaaS) to higher Platform as a Service (PaaS). In this paper we present range of dissimilar techniques or security algorithms exploiting to uphold the secrecy and security of the cloud with cryptographic algorithms.

References

K. Jeffery and B. Neidecker-Lutz, "The Future of Cloud Computing Opportunities for European Cloud Computing Beyond 2010," European Commission Information Society and Media, Nov. 2012.

R. Barga, J. Bernabeu Auban, and D. Gannon, "Cloud computing architecture and application programming," in Proc. SIGACT News, vol. 40, no. 2, pp. 94-95, 2009.

S. S. Khan and R. R. Tuteja, "Security in Cloud Computing using Cryptographic Algorithms," International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 1, pp. 1-7, 2015.

N. R. Putri, M. Charles, and M. Ganga, "Enhancing Information Security in Cloud Computing Services using SLA Based Metrics," M. Eng. thesis, School of Computing Blekinge Institute of Technology, Computer Science, Sweden, March 2011.

N. Jain and G. Kaur, "Implementing DES Algorithm in Cloud for Data Security," VSRD International Journal of Computer Science and Information Technology, vol. 2, no. 4, pp. 316-321, 2012.

J. H. Allen, S. Barnum, and R. J. Ellison, "Software Security Engineering: A Guide for Project Managers," Addison Wesley Professional, 2008.

SANS, "SANS Information Security resources" [Online]. Available: http://www.sans.org/informationsecurity.php, 2010.

ISACA, "COBIT 4.1" [Online]. Available at: https://www.saca.org/knowledge center/cobit/documents/COBIT4.pdf, 2007.

T. Mather, S. Kumaraswamy, and S. Latif, "Cloud Security and Privacy," O'Reilly, 2009.

D. S. Abdul Elminaam, H. M. Abdul Kader, and M. M. Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms," International Journal of Computer Science and Network Security, vol. 8, no. 12, pp. 280-286, 2008.

A. Kumar, S. Jakhar, and S. Makka, "Comparative Analysis between DES and RSA Algorithms," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 7, pp. 66-71, July 2012.

W. Stallings, "Cryptography and Network Security: Principles and Practice," 6th ed., Pearson Education, 2014.

C. Sanchez-Avila and R. Sanchez Reillol, "The Rijndael block cipher (AES proposal): a comparison with DES," in Proc., 35th IEEE International Carnahan Conference on Security Technology, pp.134-138, 2001.

A. Sachdev and M. Bhansali, "Enhancing Cloud Computing Security using AES Algorithm," International Journal of Computer Applications, vol. 67, no. 9, pp. 87-92, 2013.

P. Suresh et al., "Secure Cloud Environment Using RSA Algorithm," International Research Journal of Engineering and Technology, vol. 03, no. 2, pp. 144-148, 2016.

W. Stallings, "Cryptography and Network Security: Principles and Practice," 5th ed., Prentice Hall, 2011.

G. Singh and S. Supriya, "A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security," International Journal of Computer Applications, vol. 67, no. 19, pp. 33-38, 2013.

N. Ziong, "DES" [Online]. Available at: http://www.tropsoft.com/strongenc/des, 2014.

V. Biksham and D. Vasumathi, "Query based computations on encrypted data through homomorphic encryption in CC security," in Proc. IEEE International Conference on Electrical, Electronics, and Optimization Techniques, pp. 34-37, 2016.

P. Sha and Z. Zhu, "The Modification Of RSA Algorithm To Adapt Fully Homomorphic Encryption Algorithm In CC," in Proc. IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 123-126, 2016.

V. P. Bansal and S. Singh, "A Hybrid Data Encryption Technique using RSA and Blowfish for CC on FPGAs," in Proc. IEEE International Conference on Recent Advances in Engineering & Computational Sciences, pp. 57-60, 2015.

Downloads

Published

15-05-2019

How to Cite

Srilakshmi, K., & Bhargavi, P. (2019). Cloud Computing Security Using Cryptographic Algorithms. Asian Journal of Computer Science and Technology, 8(S3), 76–80. https://doi.org/10.51983/ajcst-2019.8.S3.2082