A Study of Securing Cloud Data Using Encryption Algorithms

Authors(6) :-T. A. Mohanaprakash, A. Irudayapaulraj Vinod, S. Raja, Ari Pavan Kalyan, C. B. Babu, Golla Vivek

Huge amount of data is energetically updated in today’s world. In cloud computing there are a lot of important problems which include issues of privacy, security, secrecy, communications capacity, government surveillance, consistency, and responsibility, among others. Encryption is a popular technique for protecting complex data. This paper proposes a summary of security issues and also examines the possibility of applying encryption procedure for data security and privacy in cloud computing. We also discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of various security algorithms.

Authors and Affiliations

T. A. Mohanaprakash
Assistant Professor, Department of CSE, Panimalar Institute of Technology, Chennai, TamilNadu, India
A. Irudayapaulraj Vinod
Student , Department of CSE, Panimalar Institute of Technology, Chennai, TamilNadu, India,
S. Raja
Student , Department of CSE, Panimalar Institute of Technology, Chennai, TamilNadu, India,
Ari Pavan Kalyan
Student , Department of CSE, Panimalar Institute of Technology, Chennai, TamilNadu, India,
C. B. Babu

Golla Vivek

Cloud Computing, Data Security, AES, Blowfish, DES, RSA, Homomorphic Encryption , IDEA

  1. Auditing and Resisting Key Exposure on Cloud Storage Akshata M. Bhand, D. A. Meshram Student, ME (IT) , RMD Sinhgad School of Engineering,Pune, Assistant Professor, ME (IT), RMD Sinhgad School of Engineering, Pune,2017
  2. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage Jia Yu, and Huaqun Wang - IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. , NO., 2016
  3. M.TECH, Dept. of CSE TKREC, JNTUH T.S, 2016
  4. Enabling Cloud Storage Auditing with Key- Exposure Resistance Jia Yu, Kui Ren, Senior Member, IEEE, Cong Wang, Member, IEEE and Vijay Varadharajan, Senior Member, IEEE , IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL XX NO1. , 2015
  5. A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance - Sneha Singha , S. D. Satav - International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611,2014
  6. C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, Vol. 62, No. 2, pp. 362- 375, 2013.
  7. Y. Zhu, H.G. Ahn, H. Hu, S.S. Yau, H.J. An, and C.J. Hu, “Dynamic Audit Services for Outsourced Storages in Clouds,” IEEE Trans. on Services Computing, vol. 6, no. 2, pp. 409-428, 2013.
  8. K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and opportunities,” World Wide Web, vol. 15, no.4, pp. 409-428, 2012.
  9. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
  10. Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, and S.
  11. S. Yau, “Efficient Provable Data Possession for Hybrid Clouds,” Proc. 17th ACM Conference on Computer and Communications Security, pp. 756-758, 2010.
  12. C. Wang, K. Ren, W. Lou, and J. Li, “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
  13. F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Efficient Remote Data Integrity checking in Critical Information Infrastructures,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1-6, 2008.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 730-734
Manuscript Number : CSEIT1831142
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

T. A. Mohanaprakash, A. Irudayapaulraj Vinod, S. Raja, Ari Pavan Kalyan, C. B. Babu, Golla Vivek, "A Study of Securing Cloud Data Using Encryption Algorithms", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.730-734, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT1831142

Article Preview

Follow Us

Contact Us