A Study of Securing Cloud Data Using Encryption Algorithms

Authors

  • T. A. Mohanaprakash   Assistant Professor, Department of CSE, Panimalar Institute of Technology, Chennai, TamilNadu, India
  • A. Irudayapaulraj Vinod   Student , Department of CSE, Panimalar Institute of Technology, Chennai, TamilNadu, India,
  • S. Raja   Student , Department of CSE, Panimalar Institute of Technology, Chennai, TamilNadu, India,
  • Ari Pavan Kalyan   Student , Department of CSE, Panimalar Institute of Technology, Chennai, TamilNadu, India,
  • C. B. Babu  
  • Golla Vivek  

Keywords:

Cloud Computing, Data Security, AES, Blowfish, DES, RSA, Homomorphic Encryption , IDEA

Abstract

Huge amount of data is energetically updated in today’s world. In cloud computing there are a lot of important problems which include issues of privacy, security, secrecy, communications capacity, government surveillance, consistency, and responsibility, among others. Encryption is a popular technique for protecting complex data. This paper proposes a summary of security issues and also examines the possibility of applying encryption procedure for data security and privacy in cloud computing. We also discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of various security algorithms.

References

  1. Auditing and Resisting Key Exposure on Cloud Storage Akshata M. Bhand, D. A. Meshram Student, ME (IT) , RMD Sinhgad School of Engineering,Pune, Assistant Professor, ME (IT), RMD Sinhgad School of Engineering, Pune,2017
  2. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage Jia Yu, and Huaqun Wang - IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. , NO., 2016
  3. M.TECH, Dept. of CSE TKREC, JNTUH T.S, 2016
  4. Enabling Cloud Storage Auditing with Key- Exposure Resistance Jia Yu, Kui Ren, Senior Member, IEEE, Cong Wang, Member, IEEE and Vijay Varadharajan, Senior Member, IEEE , IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL XX NO1. , 2015
  5. A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance - Sneha Singha , S. D. Satav - International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611,2014
  6. C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, Vol. 62, No. 2, pp. 362- 375, 2013.
  7. Y. Zhu, H.G. Ahn, H. Hu, S.S. Yau, H.J. An, and C.J. Hu, “Dynamic Audit Services for Outsourced Storages in Clouds,” IEEE Trans. on Services Computing, vol. 6, no. 2, pp. 409-428, 2013.
  8. K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and opportunities,” World Wide Web, vol. 15, no.4, pp. 409-428, 2012.
  9. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
  10. Y. Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu, and S.
  11. S. Yau, “Efficient Provable Data Possession for Hybrid Clouds,” Proc. 17th ACM Conference on Computer and Communications Security, pp. 756-758, 2010.
  12. C. Wang, K. Ren, W. Lou, and J. Li, “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
  13. F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Efficient Remote Data Integrity checking in Critical Information Infrastructures,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1-6, 2008.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
T. A. Mohanaprakash, A. Irudayapaulraj Vinod, S. Raja, Ari Pavan Kalyan, C. B. Babu, Golla Vivek, " A Study of Securing Cloud Data Using Encryption Algorithms, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.730-734, January-February-2018.