Implement a New Encryption Algorithm for Providing Security in Cloud Computing (original) (raw)
Related papers
Cloud Computing -- An Approach with Modern Cryptography
2013
In this paper we are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption techniques along with RSA. Cloud computing provides the customer with the requested services. It refers to applications and services that run on distributed network using virtualized resources and accessed by common IP and network standard. While providing data services it is becoming important to provide security for data. In cloud computing keeping data secure is an important issue to be focused. Even though AES was designed for military purposes, now a days it is been commercially adopted worldwide as it can encrypt most confidential document, as well as it can work in most restricted areas, and offers good defense against various attack techniques, and security level to protect data for next 2-3 decades.
Cryptography in the Cloud: Securing Data in Cloud with Encryption
Cloud computing has helped in expanding the resources without using any new architecture, human effort or programs. Even though cloud computing helps to store a large amount of information, some of the important problems faced are data privacy, information security, software security, access control and virtualization security. Privacy has become a concern as the companies have adapted to move all the sensitive data to cloud and cloud companies should assure on the privacy of the organization's data. Organizations and users can use applications without configuration and view all documents on any wireless access device when cloud storage is implemented and such information will also be stored by the cloud service provider. This paper discusses about the AES encryption mechanism used in cloud computing as this is a modern secure cloud protection and safety technology that is implemented in the cloud platform in order to secure the stored data within the cloud.
IJERT-A Review on Clouds Security Based Encryption and Decryption Techniques
International Journal of Engineering Research and Technology (IJERT), 2021
https://www.ijert.org/a-review-on-clouds-security-based-encryption-and-decryption-techniques https://www.ijert.org/research/a-review-on-clouds-security-based-encryption-and-decryption-techniques-IJERTV10IS020122.pdf Today, large amounts of electronic data have been created, and the work of organizations that need data recovery services can suffer from various natural or man-made disasters, which can lead to huge data losses. Encryption and spatial encryption performance and average response time have been estimated based on the size of the data file. RSA encryption is often used in cloud storage. It allows cloud services to search encrypted data directly. Cloud Server provides storage and search services. To perform efficient searches, the cloud uses verification keys to maintain privacy protection or meet authentication requirements and provide equivalent proof of encrypted documents based on tokens. Most security issues are caused by people deliberately creating malicious or malicious purposes. This Paper reviews and examines some Encryption and Decryption technologies. As a result, the better solution to the symmetric key encryption and the asymmetric key encryption is provided. I INTRODUCTION Cloud computing is a distributed community that provides calculating or storage space as services to end users. The architecture / model of cloud computing is that all servers, networks, presentations or other basics connected to the facts centre are accessible to the end users. Cloud computing is upward in attention of technology and business organizations, but this is useful for solving social problems. It can also be beneficial. Cloud computing refers to online operation, configuration and access to applications. It provides online data storage, infrastructure or submissions. Cloud computing allows individuals and businesses to shift the burden by managing large amounts of data or performance processes that require computing for powerful servers. Due to the growing approval of cloud figuring, more or more data proprietors are being encouraged to subcontract their data to cloud attendants in order to provide great convenience and reduce data management costs. Data tenants provide services to many businesses and companies, and they insist on improving data security standards by following a covered method, including following: data encryption, key organization, strong admission controls, or security intellect. The cloud attendant performs query or returns encrypted papers with an additional proof according to the token generated by Data owners. The Data users will receive the result with the corresponding proof so they can verify the correctness and decrypt scrambled leaflets after verification is accurate. Concepts Of Cloud Computing-Cloud computing is an advantage of information technology / business applications. Any organization can gain this benefit by paying or renting usage. Storage, servers and applications belong to the cloud computing area and are prerequisites for on-demand access. Therefore, unlike traditional methods of building data centers, hardware, applications and applications can be executed in a secure way before concentrating on building / transmitting business solutions. Cloud computing eliminates the need for expensive data centers and management because cloud vendors provide, manage and monitor the health and accessibility of the framework. Registering a cloud is an event on the network that allows administrators to provide versatility, quality of service (QoS) and, in most cases, to ensure custom on-demand and low-cost computing infrastructure. These infrastructures can be simple and access in a universal way. Cloud computing is a model used to authorize expedient, on-demand network admission to a public pool of configurable computing value (such as systems, servers, storage, function, or management). These resources can be managed by negligible or cloud Service-fast configuration and release The term "cloud" for vendor interaction is built from the network and its schematic representation is cloud. It refers to various specific types of services or submission that have been communicated in Internet cloud, and in many cases the devices used to get these products and applications require no special applications. Cloud Architecture-The rise of cloud computing is rapidly changing business and innovative ideas and having different effects on different individuals. For utilities and IT customers, IT management (ITaaS)-that is, computing, storage and applications is transferred from the central data centre via the Internet. For Internet and software developers, this is the stage of development of web-scale programming. Operating environment For infrastructure providers and administrators, it is a huge distributed data centre infrastructure that is connected to IP networks. Top layer (application layer): The top application that is delivered as needed according to the software as a service model (SaaS).
Subject Review: Cloud Computing Security Based on Cryptography
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.
A New Cryptographic Encryption Approach for Cloud Environment
International Journal on Recent and Innovation Trends in Computing and Communication, 2018
Cloud security and trust management are an important issue in the cloud environment. Cloud computing is the result of the evolution of virtualization, service-oriented design, and the widespread adoption of involuntary and utility computing. Today, cloud computing is the fastest growing technical term and captures a global service-oriented market, so cloud computing service providers and cloud computing consumers need to maintain trust between them. In cloud security, if you discuss the security procedures of traditional IT information systems, designing security into cloud software during the software development life cycle can greatly reduce the cloud attack surface. With cloud computing providing Security as a Service (SAAS), security software is an important issue. From a cloud customer perspective, the use of security services in the cloud reduces the need for security software development. The requirements for security software development are transferred to the cloud provider. This work proposes a new cloud environment security and trust management algorithm, which uses the cryptosystem method to improve the single alphabet based on the concept of multi-letter cipher. Encryption and decryption is applied to plain text to encrypt text and cipher text for plain text conversion. In this work, the algorithm's power consumption, encryption and decryption throughput, and security analysis are also presented.
International Journal of Science and Research Archive, 2024
Cloud computing is one of the most significant computing models, which provides easy access of resources. It is an alternative for costlier data framework and networking models. The services are provided to the data users based on their requirements. More industries are depending on the cloud, because of its fast computations and robust nature. However, there are several security concerns and threats in cloud storages. Moreover, large amounts of data are shared between people and organizations through the cloud. The data owner doesn't have control over the data in the cloud. To address the security and privacy issues in the cloud, this thesis aims at overcoming this trade-off, while considering security.
Cloud Computing Cryptography "State-Of-The-Art
2013
Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users' data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the "keys generation and management" mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that impl...
Cloud data security and various cryptographic algorithms
International Journal of Electrical and Computer Engineering (IJECE), 2023
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients' valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
A Review on Cryptography in Cloud Computing
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Cloud computing is the delivery of computing services over the web instead of keeping files on a proprietary disk drive or local memory device. Computing services can include servers, storage, databases, networking, software. The main reason and great advantage for using the cloud are that the user can store and access the stored data in the cloud from anywhere anytime and getting all its services for a low cost. Despite, Security has always been a big concern with cloud computing because the information stored in the cloud is not directly maintained by the customer. When the user uploaded or stored data during a cloud computing service, the info owners are unlikely to understand the path via which their data is being transmitted. The user is unknown to the fact whether the information is being collected, analyzed, and accessed by a third party or not. To overcome the security issues various cryptography algorithm is proposed. This paper focused on the basics of cloud computing and ...