A Review on Cryptography in Cloud Computing

Authors

  • A. Jsv Sai Bhargav  Research Scholar, Amity University Chhattisgarh, Raipur, Chhattisgarh, India
  • Advin Manhar  Assistant Professor, Amity University Chhattisgarh, Raipur, Chhattisgarh, India

DOI:

https://doi.org/10.32628/CSEIT206639

Keywords:

Cloud Computing, Cryptography, Security, Data.

Abstract

Cloud computing is the delivery of computing services over the web instead of keeping files on a proprietary disk drive or local memory device. Computing services can include servers, storage, databases, networking, software. The main reason and great advantage for using the cloud are that the user can store and access the stored data in the cloud from anywhere anytime and getting all its services for a low cost. Despite, Security has always been a big concern with cloud computing because the information stored in the cloud is not directly maintained by the customer. When the user uploaded or stored data during a cloud computing service, the info owners are unlikely to understand the path via which their data is being transmitted. The user is unknown to the fact whether the information is being collected, analyzed, and accessed by a third party or not. To overcome the security issues various cryptography algorithm is proposed. This paper focused on the basics of cloud computing and discussed various cryptography algorithms present in the existing work.

References

  1. M. A. Vouk, “Cloud computing - Issues, research and implementations,” Proc. Int. Conf. Inf. Technol. Interfaces, ITI, pp. 31–40, 2008.
  2. P. S. Wooley, “Identifying Cloud Computing Security Risks,” Contin. Educ., vol. 1277, no. February, 2011.
  3. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011.
  4. Cloud Performance Evaluation: Hybrid Load Balancing Model Based on Modified Particle Swarm Optimization and Improved Metaheuristic Firefly AlgorithmsJune 2020International Journal of Advanced Science and Technology 29(5):12315-12331, Advin Manhar.
  5. C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, 2013.
  6. V. J. Winkler, “Securing the Cloud,” Cloud Comput. Secur. Tech. tactics. Elsevier., 2011.
  7. A. U. Khan, M. Oriol, M. Kiran, M. Jiang, and K. Djemame, “Security risks and their management in cloud computing,” 4th IEEE Int. Conf. Cloud Comput. Technol. Sci. Proc., pp. 121–128, 2012.
  8. T. Mather, S. Kumaraswamy, and S. Latif, “Cloud Security and Privacy,” p. 299, 2009.
  9. F. Yahya, V. Chang, J. Walters, and B. Wills, “Security Challenges in Cloud Storage,” pp. 1–6, 2014.
  10. VijayaPinjarkar, Neeraj Raja, KrunalJha,AnkeetDalvi, “Single Cloud Security Enhancement using key Sharing Algorithm, ”Recent and Innovation Trends in Computing and 2016Communication, 2016.
  11. V. Vankireddy, N. Sudheer, R. Lakshmi Tulasi, “Enhancing Security and Privacy in Multi Cloud Computing Environment,” International Journal of Computer Science and Information Technologies, 2015.
  12. Swapnila S Mirajkar, Santoshkumar Biradar, “Enhance Security in Cloud Computing,” International Journal of Advanced Research in Computer Science and Software Engineering,2014. 13Ashalatha R, “A survey on security as a challenge in cloud computing,”International Journal of Advanced Technology & Engineering Research (IJATER) National Conference on Emerging Trends in Technology,2012.
  13. G. L. Prakash, M. Prateek and I. Singh, ’Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System’, International Journal Of Engineering And Computer Science vol. 3, issue 4, pp. 5215- 5223, April 2014
  14. S Mahim, “secure file storage on cloud using cryptography”, Mumbai, 03 | Mar-2018
  15. Ahmed Albugmi Madini ,O. Alassafi Robert Walters, ” Data Security in Cloud Computing”, 2016.

Downloads

Published

2020-12-30

Issue

Section

Research Articles

How to Cite

[1]
A. Jsv Sai Bhargav, Advin Manhar, " A Review on Cryptography in Cloud Computing" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 6, pp.225-230, November-December-2020. Available at doi : https://doi.org/10.32628/CSEIT206639