Encryption algorithm in cloud computing (original) (raw)
Related papers
A Review on Data Encryption Algorithm in Cloud Computing
International Journal of Advance Research and Innovative Ideas in Education, 2017
Cloud computing provides an illusion to the customers of using infinite computing resources that are available from anywhere, any time on demand. Cloud computing provide secure data transmission. Security of data becomes a large concern to insure various attribute like integrity, confidentiality, authentication etc. .cryptography techniques like DES,Blowfish,RC5, AES, RSA, 3DES ,Diffie-Hellman plays a major roles in protecting the data in those application which are running in a network environment. In this paper providing comparative analysis on various security algorithm which are already available.
Comparative Study on Data Encryption Algorithms in Cloud Platform
International Journal of Engineering Research and, 2017
The high growth in the cloud computing has reached the each and every corners of the world. The cloud computing offers the dynamically shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. Cloud services providers various services like SaaS, Paas, IaaS, NaaS and etc., over the internet. Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. Security is to save data from danger and vulnerability. There are so many dangers and vulnerabilities to be handled. There are still some challenges to be solved among that the security and trust issues are vital one. In this paper the various kinds of the encryption algorithms are discussed in details and the performances of those algorithms are evaluated to analysis the best algorithm for the cloud platform. This discusses the various open research issues and challenges that present in the cloud platform.
Analysis of Encryption Algorithm for Data Security in Cloud Computing
Smart Computing Techniques and Applications, 2021
Cloud computing offers various types of resources to its users. In recent years with the development of Cloud Computing, there has been an increase in the use of storage service from the cloud service providing organizations. However, there are still active issues regarding security, privacy, interoperability and reliability, which needs to be solved fast. Among these issues the issue regarding the security of cloud storage and how the same can be provided easily. This paper has helped in the study and proposal of a simple and secure as well as privacy-preserving design and architecture to cloud data sharing. The architecture has been based on the process of encryption and decryption algorithms for the protection of data stored in the cloud servers from unauthorized and illegal access.
An Overview on the Study of Data Encryption and Decryption in Cloud Computing
International Journal of Innovative Research in Computer Science & Technology, 2021
While big data technologies in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real-time is one of the greatest important issues throughout data acquisition and transfer. In order to reach an acceptable performance level, many modern applications forego data encryptions, which is unsuitable with privacy issues. In light of cloud computing concepts and features, this article examines various cloud computing systems and analyzes the cloud computing security problem and solution. Data privacy but instead service availability are major security problems in cloud computing. A single security solution will not address the cloud computing security challenge; to defend the whole cloud computing system, a mix of old and new technologies and procedures must be employed in harmony. The author demonstrates the use of encryption and decryption algorithms in terms of data confidentiality, great computational efficiency, and cloud-b...
A New Cryptographic Encryption Approach for Cloud Environment
International Journal on Recent and Innovation Trends in Computing and Communication, 2018
Cloud security and trust management are an important issue in the cloud environment. Cloud computing is the result of the evolution of virtualization, service-oriented design, and the widespread adoption of involuntary and utility computing. Today, cloud computing is the fastest growing technical term and captures a global service-oriented market, so cloud computing service providers and cloud computing consumers need to maintain trust between them. In cloud security, if you discuss the security procedures of traditional IT information systems, designing security into cloud software during the software development life cycle can greatly reduce the cloud attack surface. With cloud computing providing Security as a Service (SAAS), security software is an important issue. From a cloud customer perspective, the use of security services in the cloud reduces the need for security software development. The requirements for security software development are transferred to the cloud provider. This work proposes a new cloud environment security and trust management algorithm, which uses the cryptosystem method to improve the single alphabet based on the concept of multi-letter cipher. Encryption and decryption is applied to plain text to encrypt text and cipher text for plain text conversion. In this work, the algorithm's power consumption, encryption and decryption throughput, and security analysis are also presented.
COMPARISION BETWEEN PROPOSED APPROCH AND OTHER CRYPTOGRAPHICS ALGORITHM FOR CLOUD COMPUTING
isara solutions, 2022
While cloud computing models are full of advantages compared to on-site models, they're still susceptible to both inside and outside attacks. Therefore, cloud developers need to take security measures to protect their users' sensitive data from cyber attacks. This paper is written for cloud developers and service providers who want to increase the security of their cloud service solutions. In this paper comparison between proposed approach and other algorithms has been done on the basis of throughput for different file sizes.
Survey on Data Security using Encryption Algorithms in Cloud Environment
International journal of scientific research in computer science, engineering and information technology, 2017
Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, study about the different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.
Cloud data security and various cryptographic algorithms
International Journal of Electrical and Computer Engineering (IJECE), 2023
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients' valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
Performance Analysis of Encryption Algorithm in Cloud Computing
—Security is the most important factor in cloud computing for ensuring client data is placed on secure mode in the cloud. Cloud computing is a flexible, cost-effective and proven delivery platform for providing business. Main goal of cloud computing is to provide easily scalable access to computing resources to improve organization performance. In this research paper we have discussed the problem of data security in cloud and show performance analysis to enhance security in terms of encryption algorithm and also explain an overview of cloud and security issues.
Implement a New Encryption Algorithm for Providing Security in Cloud Computing
2016
The Internet is becoming an increasingly vital tool in our everyday life, both professional and personal, as its users are becoming more numerous. It is not surprising that business is increasingly conducted over the Internet. Perhaps one of the most revolutionary concepts of recent years is Cloud Computing. The use of Cloud Computing is gaining popularity due to its mobility, huge availability and low cost. Many small businesses are realizing that cloud computing isn't just for large corporations. Many providers offer services that are targeted at the small business owner. Cloud computing presents unique opportunities for small businesses, giving them access to infrastructure that had traditionally only been available to much larger organizations. Cryptography is one of the solutions which can prevent the intruders to enter into clouds for hacking information. Our paper gives solution for small scale industry. Out Solutions For Encryption at Small Scale industry, which will w...