A Study on Cloud Computing Securities and Algorithms

Authors

  • M. Subhashini  Research Scholar, Department of Computer Science, Marudupandiyar College(Affiliated to Bharathidasan University), Thanjavur, Tamilnadu, India
  • Dr. P. Srivaramangai  Associate Professor, Department of Computer Science, Marudupandiyar College(Affiliated to Bharathidasan University), Thanjavur, Tamilnadu, India

Keywords:

Cloud Computing,Security, AES, DES, 3DES,RSA,ECC

Abstract

Cloud computing is that describe about a digital era of an Internet-based computing and after that step evolution of the internet access. It has received important attention in current years, however security protection issue is one of the main inhibitor for reducing the development of cloud computing. In this Cloud computing technology there are a group of important policy issues, which include several issues of privacy, security, anonymity, telecommunications capacity, government surveillance, reliability, and liability, compare among others. However the most important between them is security protection and how cloud provider assures it. In this paper, we have a tendency to discussed about introduction of cloud computing and security concerns after that number of symmetric and asymmetric algorithms like DES, 3DES, AES, RSA, ECC, Blowfish etc.

References

  1. Lizhe Wang, Jie Tao, Kunze M., Castellanos A.C., Kramer D., Karl W., "Scientific Cloud Computing: Early  Definition and Experience," 10th IEEE Int. Conference on  High Performance Computing and Communications,  pp. 825-830, Dalian, China, Sep. 2008,  ISBN: 978-0-7695-3352-0.
  2. Pring et al., "Forecast: Sizing the cloud; understanding the opportunities in cloud services," Gartner Inc., Tech. Rep.  G00166525, March 2009.
  3. Aman Bakshi, Yogesh B. Dujodwala, "Securing cloud from  DDoS Attacks using Intrusion Detection System in Virtual  Machine," ICCSN ’10 Proceeding of the 2010 Second  International Conference on Communication Software and  networks, pp. 260-264, 2010, IEEE Computer Society, USA,  2010. ISBN: 978-0-7695-3961-4.
  4. H. KAMAL IDRISSI, A. KARTIT, M. EL MARRAKI FOREMOST SECURITY APPREHENSIONS IN CLOUD COMPUTINGJournal of Theoretical and Applied Information Technology 31 st January 2014. Vol. 59 No.3
  5. Kuyoro S. O, Ibikunle F. & Awodele O  Cloud Computing Security Issues and ChallengesInternational Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011
  6. Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Zhenghu Gongng  The Characteristics of Cloud Computing2010 39th International Conference on Parallel Processing Workshopse Brazilian Computer Society 2010
  7. SO, Kuyoro. Cloud computing security issues andchallenges. International Journal of Computer Networks, 2011, vol. 3, no 5.
  8. D. H. Rakesh, R. R. Bhavsar, and A. S. Thorve, "Data security over cloud," International Journal of Computer Applications, no. 5, pp. 11-14, 2012.
  9. J. Krumm, "A survey of computational location privacy," Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391-399, 2009.
  10. K. Hwang, S Kulkarni and Y. Hu, "Cloud security with virtualized defence and Reputation-based Trust  management," Proceedings of 2009 Eighth IEEE International  Conference on Dependable, Autonomic and Secure  Computing (security in cloud computing), pp. 621-628,  Chengdu, China, December, 2009. ISBN: 978-0-7695-  3929 -4.
  11. Marios D. Dikaiakos, Dimitrios Katsaros, Pankaj Mehra, George Pallis, Athena Vakali, "Cloud Computing:  Distributed Internet Computing for IT and Scientific  Research," IEEE Internet Computing Journal, vol. 13, issue.  5, pp. 10-13, September 2009. DOI: 10.1109/MIC.2009.103.
  12. AL.Jeeva, Dr.V.Palanisamy And K.Kanagaram "Comparative Analysis Of Performance Efficiency And Security Measures Of Some Encryption Algorithms" International Journal Of Engineering Research And Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue 3, pp.3033- 3037, May-Jun 2012.
  13. Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI, "Homomorphic Encryption Applied to the Cloud Computing Security", World Congress on Engineering, Volume I, ISBN: 978-988-19251-3-8; ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online) , 2012.
  14. Pratap Chandra Mandal, ‘Superiority of Blowfish Algorithm’, International Journal of Advanced Research in Computer Science and Software Engineering. September (2012) ISSN: 2277-128X Vol. 2, Issue 7.
  15. G. Devi and M. Pramod Kumar, ‘Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish Algorithm’, International Journal of Computer Trends and Technology. (2012) Vol. 3 Issue 4, ISSN: 2231-2803, pp.592-596.
  16. Neha Jain and Gurpreet Kaur ‘Implementing DES Algorithm in Cloud for Data Security" VSRD International Journal of CS & IT Vol. 2 Issue 4, pp. 316-321, 2012.
  17. G. Devi , M. Pramod Kumar, "Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm" International Journal Of Computer Trends And Technology Volume 3 Issue 4, ISSN: 2231-2803, pp. 592-596,2012.
  18. D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud ,"Performance Evaluation of Symmetric Encryption Algorithms", Communications of the IBIMA Volume 8, 2009.
  19. Gurpreet Singh, Supriya Kinger "Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security" International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.
  20. Mr. Gurjeevan Singh, , Mr. Ashwani Singla and Mr. K S Sandha " Cryptography Algorithm Compaison For Security Enhancement In Wireless Intrusion Detection System" International Journal of Multidisciplinary Research Vol.1 Issue 4, August 2011.
  21. Gurpreet Singh, Supriya Kinger"Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security "International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
M. Subhashini, Dr. P. Srivaramangai, " A Study on Cloud Computing Securities and Algorithms, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.69-80, March-April-2018.