A Computer Security System for Cloud Computing Based on Encryption Technique (original) (raw)
Related papers
Analysis of Encryption Algorithm for Data Security in Cloud Computing
Smart Computing Techniques and Applications, 2021
Cloud computing offers various types of resources to its users. In recent years with the development of Cloud Computing, there has been an increase in the use of storage service from the cloud service providing organizations. However, there are still active issues regarding security, privacy, interoperability and reliability, which needs to be solved fast. Among these issues the issue regarding the security of cloud storage and how the same can be provided easily. This paper has helped in the study and proposal of a simple and secure as well as privacy-preserving design and architecture to cloud data sharing. The architecture has been based on the process of encryption and decryption algorithms for the protection of data stored in the cloud servers from unauthorized and illegal access.
Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing
2015
Cloud computing is the next big thing after internet in the field of information technology; some say it’s a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay per use model. Even though the cloud continues to grow in popularity, Usability and respectability, Problems with data protection and data privacy and other Security issues play a major setback in the field of Cloud Computing. Privacy and security are the key issue for cloud storage. Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private key encryption to hide the sensitive data of users, and cipher text retrieval. The paper analyzes the feasibility of the applying encryption algorithm for data security and privacy in cloud Storage.
Cryptography in the Cloud: Securing Data in Cloud with Encryption
Cloud computing has helped in expanding the resources without using any new architecture, human effort or programs. Even though cloud computing helps to store a large amount of information, some of the important problems faced are data privacy, information security, software security, access control and virtualization security. Privacy has become a concern as the companies have adapted to move all the sensitive data to cloud and cloud companies should assure on the privacy of the organization's data. Organizations and users can use applications without configuration and view all documents on any wireless access device when cloud storage is implemented and such information will also be stored by the cloud service provider. This paper discusses about the AES encryption mechanism used in cloud computing as this is a modern secure cloud protection and safety technology that is implemented in the cloud platform in order to secure the stored data within the cloud.
IJERT-A Review on Clouds Security Based Encryption and Decryption Techniques
International Journal of Engineering Research and Technology (IJERT), 2021
https://www.ijert.org/a-review-on-clouds-security-based-encryption-and-decryption-techniques https://www.ijert.org/research/a-review-on-clouds-security-based-encryption-and-decryption-techniques-IJERTV10IS020122.pdf Today, large amounts of electronic data have been created, and the work of organizations that need data recovery services can suffer from various natural or man-made disasters, which can lead to huge data losses. Encryption and spatial encryption performance and average response time have been estimated based on the size of the data file. RSA encryption is often used in cloud storage. It allows cloud services to search encrypted data directly. Cloud Server provides storage and search services. To perform efficient searches, the cloud uses verification keys to maintain privacy protection or meet authentication requirements and provide equivalent proof of encrypted documents based on tokens. Most security issues are caused by people deliberately creating malicious or malicious purposes. This Paper reviews and examines some Encryption and Decryption technologies. As a result, the better solution to the symmetric key encryption and the asymmetric key encryption is provided. I INTRODUCTION Cloud computing is a distributed community that provides calculating or storage space as services to end users. The architecture / model of cloud computing is that all servers, networks, presentations or other basics connected to the facts centre are accessible to the end users. Cloud computing is upward in attention of technology and business organizations, but this is useful for solving social problems. It can also be beneficial. Cloud computing refers to online operation, configuration and access to applications. It provides online data storage, infrastructure or submissions. Cloud computing allows individuals and businesses to shift the burden by managing large amounts of data or performance processes that require computing for powerful servers. Due to the growing approval of cloud figuring, more or more data proprietors are being encouraged to subcontract their data to cloud attendants in order to provide great convenience and reduce data management costs. Data tenants provide services to many businesses and companies, and they insist on improving data security standards by following a covered method, including following: data encryption, key organization, strong admission controls, or security intellect. The cloud attendant performs query or returns encrypted papers with an additional proof according to the token generated by Data owners. The Data users will receive the result with the corresponding proof so they can verify the correctness and decrypt scrambled leaflets after verification is accurate. Concepts Of Cloud Computing-Cloud computing is an advantage of information technology / business applications. Any organization can gain this benefit by paying or renting usage. Storage, servers and applications belong to the cloud computing area and are prerequisites for on-demand access. Therefore, unlike traditional methods of building data centers, hardware, applications and applications can be executed in a secure way before concentrating on building / transmitting business solutions. Cloud computing eliminates the need for expensive data centers and management because cloud vendors provide, manage and monitor the health and accessibility of the framework. Registering a cloud is an event on the network that allows administrators to provide versatility, quality of service (QoS) and, in most cases, to ensure custom on-demand and low-cost computing infrastructure. These infrastructures can be simple and access in a universal way. Cloud computing is a model used to authorize expedient, on-demand network admission to a public pool of configurable computing value (such as systems, servers, storage, function, or management). These resources can be managed by negligible or cloud Service-fast configuration and release The term "cloud" for vendor interaction is built from the network and its schematic representation is cloud. It refers to various specific types of services or submission that have been communicated in Internet cloud, and in many cases the devices used to get these products and applications require no special applications. Cloud Architecture-The rise of cloud computing is rapidly changing business and innovative ideas and having different effects on different individuals. For utilities and IT customers, IT management (ITaaS)-that is, computing, storage and applications is transferred from the central data centre via the Internet. For Internet and software developers, this is the stage of development of web-scale programming. Operating environment For infrastructure providers and administrators, it is a huge distributed data centre infrastructure that is connected to IP networks. Top layer (application layer): The top application that is delivered as needed according to the software as a service model (SaaS).
An Overview on the Study of Data Encryption and Decryption in Cloud Computing
International Journal of Innovative Research in Computer Science & Technology, 2021
While big data technologies in cloud computing are rapidly growing in popularity, privacy issues have increased dramatically. Encrypting data in real-time is one of the greatest important issues throughout data acquisition and transfer. In order to reach an acceptable performance level, many modern applications forego data encryptions, which is unsuitable with privacy issues. In light of cloud computing concepts and features, this article examines various cloud computing systems and analyzes the cloud computing security problem and solution. Data privacy but instead service availability are major security problems in cloud computing. A single security solution will not address the cloud computing security challenge; to defend the whole cloud computing system, a mix of old and new technologies and procedures must be employed in harmony. The author demonstrates the use of encryption and decryption algorithms in terms of data confidentiality, great computational efficiency, and cloud-b...
Applying Encryption Algorithm for Data Security in Cloud Storage
Advances in Ubiquitous Networking, 2016
Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay per use model. Even though the cloud continues to grow in popularity, Usability and respectability, Problems with data protection and data privacy and other Security issues play a major setback in the field of Cloud Computing. Privacy and security are the key issue for cloud storage. Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private key encryption to hide the sensitive data of users, and cipher text retrieval. The paper analyzes the feasibility of the applying encryption algorithm for data security and privacy in cloud Storage.
IJERT-Data Access Control using Cryptographic techniques in Cloud Computing environment
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/data-access-control-using-cryptographic-techniques-in-cloud-computing-environment https://www.ijert.org/research/data-access-control-using-cryptographic-techniques-in-cloud-computing-environment-IJERTV3IS052052.pdf Cloud computing provides a service based on internet for several shared resources and system software across various environment. For secure cloud storage the process of encryption of the data to the users for various needs has been brought by the delegated access control method. Generally storage in public cloud requires high communication, heavy load due to maximum storage and high computational costs. In this paper, we are implementing multi-cloud environment for secure storage where it acts as a public cloud and provides low costs, also it involves two-layer encryption over the data stored in the cloud. We are using an efficient AES algorithm which provides higher confidentiality and privacy for several users in the cloud and stores the data in multi-clouds where the users can retrieve with the keys later while delegating it through access control from the cloud[1]. Security as well as expenses are the peak issues in this field of research and they vary significantly, depending on the vendor.
Cloud Computing Security using by Applying Cryptography Technique
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Cloud computing is the provision of computing and storage capacity to users as a service. Cloud storage is a type of networked online storage where data is stored in virtualized storage pools as a subservice of infrastructure as a service (IaaS) in cloud computing. Cloud computing plays a significant role in the efficient use of resources and in the utilization of service. Regardless of the cloud category (e.g. private, public, hybrid or inter-cloud), all service providers rely on domain server data. As a rapid development and deployment of cloud computing and cloud storage, users are increasingly concerned about security and privacy issues involved in these techniques. This paper provides a summary of basic security problems that consist of conventional security issues. It also addresses the additional challenges resulting from the cloud computing paradigm being used by cloud system providers and consumers. In addition, solutions suggested by some researchers are presented with a focus on cryptographic techniques which support secure storage of the cloud.
Subject Review: Cloud Computing Security Based on Cryptography
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.