Efficient and Enhanced Data Encryption In Cloud Computing

Authors

  • Mahalingam. R  PG Scholar, Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatore, Tamilnadu, India
  • S. Jeevanandham  Assistant Professor, Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatore, Tamilnadu, India
  • Dr. N. Suguna  Professor, Akshaya College of Engineering and Technology, Kinathukadavu, Coimbatore, Tamilnadu, India

Keywords:

Cloud Computing, Cloud Platform, Data Privacy, Data Security, Models of Cloud Computing.

Abstract

Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand. However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this project, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment. The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may not be trusted.

References

  1. G. Ateniese, K. Benson, and S. Hohenberger, 2009 ,“Key-private proxy Re-encryption,” in Topics in Cryptology–CT-RSA (Lecture Notesin Computer Science), vol. 5473. Berlin, Germany: Springer-Verlag, pp. 279-294.
  2. Sun Microsystems, 2009, “Introduction to Cloud Computing Architecture”, Sun Microsystems Inc., white paper, pp. 1-17
  3. MELL, P. and GRANCE, T, 2009. “Definition of Cloud Computing”, Draft NIST working, vol.5, pp. 7-19.
  4. J. Shao, 2012, “Anonymous ID-based proxy re-encryption,” in Information Security and Privacy (Lecture Notes in Computer Science), vol. 7372. Berlin, Germany: Springer-Verlag, pp. 364–375.
  5. Bellare, Mihir; Rogaway, Phillip (21 September 2005), “Introduction to Modern Cryptography, by random grids, vol.1, pp.10-21.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Mahalingam. R, S. Jeevanandham, Dr. N. Suguna, " Efficient and Enhanced Data Encryption In Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.153-157, May-June-2019.