A Study of Securing Cloud Data Using Encryption Algorithms
Keywords:
Cloud Computing, Data Security, AES, Blowfish, DES, RSA, Homomorphic Encryption , IDEAAbstract
Huge amount of data is energetically updated in today’s world. In cloud computing there are a lot of important problems which include issues of privacy, security, secrecy, communications capacity, government surveillance, consistency, and responsibility, among others. Encryption is a popular technique for protecting complex data. This paper proposes a summary of security issues and also examines the possibility of applying encryption procedure for data security and privacy in cloud computing. We also discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of various security algorithms.
References
- Auditing and Resisting Key Exposure on Cloud Storage Akshata M. Bhand, D. A. Meshram Student, ME (IT) , RMD Sinhgad School of Engineering,Pune, Assistant Professor, ME (IT), RMD Sinhgad School of Engineering, Pune,2017
- Strong Key-Exposure Resilient Auditing for Secure Cloud Storage Jia Yu, and Huaqun Wang - IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. , NO., 2016
- M.TECH, Dept. of CSE TKREC, JNTUH T.S, 2016
- Enabling Cloud Storage Auditing with Key- Exposure Resistance Jia Yu, Kui Ren, Senior Member, IEEE, Cong Wang, Member, IEEE and Vijay Varadharajan, Senior Member, IEEE , IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL XX NO1. , 2015
- A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance - Sneha Singha , S. D. Satav - International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611,2014
- C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, Vol. 62, No. 2, pp. 362- 375, 2013.
- Y. Zhu, H.G. Ahn, H. Hu, S.S. Yau, H.J. An, and C.J. Hu, “Dynamic Audit Services for Outsourced Storages in Clouds,” IEEE Trans. on Services Computing, vol. 6, no. 2, pp. 409-428, 2013.
- K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and opportunities,” World Wide Web, vol. 15, no.4, pp. 409-428, 2012.
- Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
- Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, and S.
- S. Yau, “Efficient Provable Data Possession for Hybrid Clouds,” Proc. 17th ACM Conference on Computer and Communications Security, pp. 756-758, 2010.
- C. Wang, K. Ren, W. Lou, and J. Li, “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
- F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Efficient Remote Data Integrity checking in Critical Information Infrastructures,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1-6, 2008.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.