Survey on Data Security using Encryption Algorithms in Cloud Environment

Authors

  • Santhi Baskaran  Information Technology, Pondicherry Engineering College, Pillaichavadi, Puducherry, Tamil Nadu, India
  • Isaiarasi A  Information Technology, Pondicherry Engineering College, Pillaichavadi, Puducherry, Tamil Nadu, India

Keywords:

Cloud Computing, Cloud security, Encryption algorithms, Security challenges, security.

Abstract

Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, study about the different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.

References

  1. T. Ramaporkalai, Security Algorithms in Cloud Computing,        International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 2, Apr 2017  .
  2. R.Kirubakaramoorthi*, D. Arivazhagan and D. Helen, Survey on Encryption Techniques used to Secure Cloud Storage , Indian Journal of Science and Technology, Vol 8(36),2015.
  3. Kumar(2012), "World of Cloud Computing & Security," International Journal of Cloud Computing and Services Science (IJ-CLOSER)Vol.1, No.2, pp. 53~58.
  4. Y.Tang, P.P.Lee, J.C.S.Lui, and R.Perlman (2012), "Secure Overlay Cloud Storage with Access Control and Assured Deletion," IEEE Transactions on Dependable and Secure Computing, Vol.9, No.6, Nov. 2012, pp.903-916.
  5. Shuhua Wu and Yuefei Zhu (2011), "Improved Two-Factor Authenticated Key Exchange Protocol," International Arab Journal of Information Technology, Vol. 8, pp.66-79.
  6. Zarandioon, S., Yao, D. D., & Ganapathy V. (2011). "K2C: Cryptographic cloud storage with lazy revocation and anonymous access," International Conference on Security and Privacy in Communication Systems, vol.2 pp. 59-76, Springer Berlin Heidelberg.
  7. Caching and M. Schunter," A clo9ud you can trust," IEEE Spectrum, Vol. 48, No. 12, 2011, pp.28-51.
  8. S.Kamara and K. Lauter (2010), "Cryptographic cloud storage" Financial Cryptography and Data Security, Springer Berlin Heidelberg, pp.136-149.
  9. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Ktaz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoics and M. Zaharia (2010), "A View of Cloud Computing, " Communications of the ACM, Vol.53, No.4, pp.50-58.
  10. Yun, C. Shi, and Y. Kim (2009), "On protecting integrity and confiden-tiality of cryptographic file system for outscored storage," Proceed-ings of 2009 ACM workshop on cloud computing security CCSA’09, vol.2,pp. 67-76.
  11. G. Ateniese, M. Steiner, and G. Tsudik (2000),"New multi-party authentication services and key agreement protocols," IEEE J. Sel. Areas Cmmun, vol. 18, no. 4, pp. 628–639.
  12. W.Diffie, P.C.V.Oorschot, and M.J.Wiener (1992),"Authentication and authenticated key exchanges," Designs, Codes and Cryptography, IEEE Spectrum Vol. 2, No.2, pp.107-125.
  13. Mazhar Ali, Saif Malik, and Samee Khan, "DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party", IEEE Transactions on Cloud Computing, 2015.
  14. Quanlu Zhang, Shenglong Li, Zhenhua Li, Yuanjian Xing, Zhi Yang, and Yafei Dai, "CHARM: A CostEfficient Multi-Cloud Data Hosting Scheme with High Availability", IEEE Transactions on Cloud Computing, vol. 3, no. 3, pp. 372-386, July-September 2015
  15. Jin Sun, Yupu Hu, and Leyou Zhang, "A Key-Policy Attribute-Based Broadcast Encryption", The International Arab Journal of Information Technology, vol. 10, no. 5, pp. 444-453, September 2013.
  16. Amol S. Choure S. M. Bansode, "A Comprehensive Survey on Storage Techniques in Cloud Computing", International Journal of Computer Applications, vol. 122, no. 18, pp. 3-25, July 2015.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Santhi Baskaran, Isaiarasi A, " Survey on Data Security using Encryption Algorithms in Cloud Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.288-294, May-June-2017.