Cryptography in Cloud Computing : A Basic Approach to confirm Security in Cloud

Authors

  • E. Manigandan  Research Scholar, Government Arts College, Thiruvannamalai, Tamil Nadu, India
  • Prof. C. Kalaiarasi  Assistant Professor, Government Arts College, Thiruvannamalai, Tamil Nadu, India

Keywords:

Cloud Computing, Cryptography, Security Issues Privacy, Security Algorithms, Encryption, Decryption

Abstract

Cloud computing is associate degree Internet-based computing model that provides many resources through Cloud Service suppliers (CSP) to Cloud Users (CU) on demand basis while not shopping for the underlying infrastructure and follows pay-per-use basis. It supports virtualization of physical resources so as to enhance potency and accomplishment of multiple tasks at identical time. Cloud Computing atmosphere (CCE) provides many readying models to represent many classes of cloud owned by organization or institutes. However, CCE offer resources to Cloud Users through many services like PaaS, SaaS, IaaS. Cloud Computing may be a notion supported the construct of summation physical resources associate decreed displaying them as an unacknowledged resource. it's a model for manufacturing resources, for searching for applications, and for manifesto-independent user access to services. Cloud will are available differing kinds, and therefore the services and therefore the applications that probably run on clouds might or might not be provided by a cloud service supplier. There are 2 distinctive cluster of models specifically readying models and repair models. Service models consists of IaaS, SaaS, PaaS. The readying or readying model consists of Public Cloud, non-public Cloud, Hybrid Cloud, Community Cloud .Cloud Computing has scores of distinct properties that create it vital. Privacy looks to be associate degree distinctive concern in cloud .Various sorts of service models beneath cloud computing facilitate varied levels of privacy services. We will get the minimum security in IaaS (Infrastructure as a Service) and most with a SaaS supplier. During this paper, we will focus upon the reviewing and understanding cloud security problems by proposing crypto algorithms and effective measures thus on make sure the knowledge security in cloud. Beside this, we will elucidate a little a lot of concerning some security aspects of cryptography by displaying some privacy problems with current cloud computing surroundings.

References

  1. SanjoliSingla, JasmeetSingh,”Cloud computing security using encryption technique”, IJARCET, vol.2, ISSUE 7.
  2. R. BalaChandar, M. S. Kavitha , K. Seenivasan,” A proficient model for high end security in cloud computing”, International Journal of Emerging Research in Management &Technology, Vol.5, Issue 10.
  3. BokefodeJayant.D, UbaleSwapnaja A, PingaleSubhash V., KaraneKailash J. , ApateSulabha S. ,”Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role bases Access Control Model”, International Journal of Computer Applications, Volume 118-No.12, May2015
  4. Karun Handa, Uma Singh,” Data Security in Cloud Computing using Encryption and Steganography”, International Journal of Computer Science and Mobile Computing”, Vol.4 Issue.5, May-2015, pg.786-791
  5. M.Vijayapriya,”security algorithm in cloud computing: overview”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol.4, ISSN: 2229-3345.
  6. RashmiNigoti, ManojJhuria, Dr. Shailendra Singh, “A survey of Cryptographic algorithms for cloud computing”, International Journal of Emerging Technologies in Computational and Applied Sciences, March 2013, ISSN (online)-2279-0055.
  7. Douglas R. Stinson,” Cryptography: Theory& Practice”, Chapman and Hall Publications.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
E. Manigandan, Prof. C. Kalaiarasi, " Cryptography in Cloud Computing : A Basic Approach to confirm Security in Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 3, pp.58-63, January-February-2018.