Enhancing Security Mechanism to Sensitive Message and Data over Cloud

Authors

  • Neil Kamal  P.G. Student, Madhya Pradesh, India CSE, LNCTS (RIT), Indore, Madhya Pradesh, India
  • Mayur Rathi  Assistant Professor, Madhya Pradesh, India CSE, LNCTS (RIT), Indore, Madhya Pradesh, India

Keywords:

Cloud Computing, Cryptography, Honey Encryption, Securing Data

Abstract

Cloud computing is becoming very poplar due to its cost effectiveness. Because it provides large exposure area making prone to security threat. Shifts infrastructure costs to operational cost. In cloud computing data moves to and from in premises network to outside networks. This raises paradigm brings concerning several new security challenges, that haven't been well addressed. Securing essential cloud resources from the unauthorized access of the users is one amongst the most important problems that cause reduces the growth of this technology within the IT Industries. Encryption of message data is one way to secure highly sensitive data over cloud. Paper covers mechanism to enhance security of sensitive message over cloud by providing mechanism on honey encryption method and using AES with custom mechanism.

References

  1. Yashpal Kadam, "Security Issues in Cloud Computing A Transparent View", International Journal of Computer Science Emerging Technology, Vol-2 No 5 October, 2011 , 316-322
  2. Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal, "A Survey on Security Issues in Cloud Computing", 2011
  3. Mladen A. Vouk, "Cloud Computing - Issues, Research and Implementations", Journal of Computing and Information Technology - CIT 16, 2008, 4, 235-246
  4. Ye Hu, Johnny Wong, Gabriel Iszlai, Marin Litoiu, "Resource Provisioning for Cloud Computing", IBM Canada Ltd., 2009
  5. Daniele Catteddu, Giles Hogben, "Cloud Computing:- Benefits, risks and recommendations for information security", November, 2009
  6. "Cloud Computing: Silver Lining or Storm Ahead?", Volume 13 Number 2, Spring 2010
  7. NGONGANG GUY MOLLET, "CLOUD COMPUTING SECURITY" , Thesis Paper, April 11
  8. Joan Daemen, Vincent Rijmen, "AES Proposal: Rijndael", 1999
  9. Joan Daemen, Vincent Rijmen, "Announcing the ADVANCED ENCRYPTION STANDARD (AES)", Federal Information Processing Standards Publication 197, November 26, 2001
  10. Joshua Holden, Mohammad Musa, Edward Schaefer, and Stephen Wedig, "A Simplified AES Algorithm", January 2010.
  11. TCloud: A Trusted Architecture for Cloud, International Journal of Advanced Science and Technology Vol.63, 2014.
  12. Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-3, Issue-3), 2014
  13. Using Cryptography Algorithms to Secure Cloud Computing Data and Services, American Journal of Engineering Research (AJER) e-ISSN: 2320-0847 p-ISSN : 2320-0936 Volume-6, Issue-10, pp-334-337, 2017
  14. Improving Data Integrity for Data Storage Security in Cloud Computing, IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.6, June 2015

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Neil Kamal, Mayur Rathi, " Enhancing Security Mechanism to Sensitive Message and Data over Cloud , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1786-1790, January-February-2018.