The Implementation and Comparative Analysis for Security Algorithms in Cloud Environment

Authors

  • D. Pharkkavi  Research Scholar, Sri Vijay Vidyalaya College of Arts & Science, Dharmapuri, Tamilnadu, India
  • Dr. D. Maruthanayagam  Head/Professor, PG and Research Department of Computer Science, Sri Vijay Vidyalaya College of Arts & Science, Dharmapuri, Tamilnadu, India

Keywords:

Cloud Computing, Security, Encryption, Decryption, Public Key and Private Key.

Abstract

Cloud computing is a rising technology that is still unclear to many security issues. The cloud data and services reside in massively scalable data centers and can be accessed everywhere. The growth of the cloud users has unfortunately been accompanied with a growth in malicious activity in the cloud. More and more vulnerabilities are discovered, and nearly every day, new security advisories are published. Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. So the most challenging issue today in cloud servers is to ensure data security and privacy of the users. The different algorithms have been proposed to provide security to critical data. This paper gives a comparative analysis of some existing security algorithms in Cloud Computing. To ensure the security of data in cloud environment, also analyzed the performance of existing algorithm based on three parameters namely Time Complexity, Space Complexity and Throughput.

References

  1. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, BhavaniThuraisingham, "Security Issues for Cloud Computing". The University of Texas at Dallas, USA, International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010.
  2. Anup R. Nimje, "Cryptography In Cloud-Security Using DNA (Genetic) Techniques", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue5, pp.1358-1359, September- October 2012.
  3. Danish Jamil, Hassan Zaki, "Cloud Computing Security", International Journal of Engineering Science and Technology (IJEST).
  4. RachnaArora, AnshuParashar, "Secure User Data in Cloud Computing Using Encryption Algorithms", International Journal of Engineering Research and Applications (IJERA), ISSN: 2248-9622, www.ijera.com , Vol. 3, Issue 4, pp.1922-1926, Jul-Aug 2013.
  5. Engr: Farhan Bashir Shaikh, SajjadHaider, "Security Threats in Cloud Computing", 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates.
  6. Dr. P. Dinadayalan, S. Jegadeeswari, Dr. D. Gnanambigai, "Data Security Issues in Cloud Environment and Solutions", World Congress on Computing and Communication Technologies 2014.
  7. NatanAbolafya, Secure Documents Sharing System for Cloud Environments, Master of Science Thesis Stockholm, Sweden 2012.
  8. Abdullah Al Hasib, AbulAhsan Md. MahmudulHaque, "A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography", Third International Conference on Convergence and Hybrid Information Technology, 2008.
  9. Cloud Security Alliance, (2009) Security Guidance for Critical Area of Focus in Cloud Computing V2.1. [Online]. Available : https://cloudsecurityalliance.org/csaguide.pdf , accessed on Feb 2012.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
D. Pharkkavi, Dr. D. Maruthanayagam, " The Implementation and Comparative Analysis for Security Algorithms in Cloud Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.635-642, November-December-2017.