Cloud Computing Using AES

Authors(3) :-Birendra Kumar Sah, Dhirendra Yadav, C. K. Rain

Cloud computing is printed as associate application and services that run on distributed webwork victimization virtualized and it's accessed through net protocols and networking. Cloud computing resources and virtual and limitless and information’s of the physical systems thereon code running unit abstracted from the user. Cloud Computing can be a style of computing inside that dynamically scalable and often virtualized resources unit provided as a service over the online. Users needn't have information of, expertise in, or management over the technology infrastructure inside the "cloud" that supports them. To satisfy the necessities of the users the conception is to incorporate technologies that have the common theme of reliance on the internet|the net} code and knowledge unit hold on on the servers whereas cloud computing services unit provided through applications on-line which could be accessed from net browsers. Lack of security and access management is that the most important disadvantage inside the cloud computing as a result of the users subsume sensitive info to public clouds.Multiple virtual machines in the cloud can access insecure information flows as a service provider; thus to implement the cloud it is necessary to form security. therefore the most aim of this paper is to produce cloud computing security through parallel cipher model. this text proposes parallel cipher model thus on implement cloud computing security thus info can access and hold on firmly.

Authors and Affiliations

Birendra Kumar Sah
Department of Computer Science and Engineering, Adesh College of Engineering & Technology , Chandigarh, Kharar, Punjab, India
Dhirendra Yadav
Department of Computer Science and Engineering, Adesh College of Engineering & Technology , Chandigarh, Kharar, Punjab, India
C. K. Rain
Department of Computer Science and Engineering, Adesh College of Engineering & Technology , Chandigarh, Kharar, Punjab, India

Cloud Computing, Security, Cryptography, AES

  1. (Anbazhagan & Somasundaram) https://www.amrita.edu/publication/cloud-computing-security-through-symmetric-cipher-model
  2. (Woodford., augut 2016) Last updated: August 13, 2016. http://www.explainthatstuff.com/cloud-computing-introduction.html
  3. https://en.wikipedia.org/wiki/Cloud_computing_security
  4. http://researcher.watson.ibm.com/researcher/view_group_subpage.php?id=2662
  5. S.Benabbas, R.Gennaro, and Y.Vahlis. Verifiable Delegation of Computation over Large Datasets, CRYPTO 2011.
  6. R.Gennaro, C.Gentry, B.Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers, CRYPTO 2010.

Publication Details

Published in : Volume 2 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 164-167
Manuscript Number : CSEIT1722322
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Birendra Kumar Sah, Dhirendra Yadav, C. K. Rain, "Cloud Computing Using AES", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.164-167, May-June-2017. |          | BibTeX | RIS | CSV

Article Preview