Asian Journal of Computer Science and Technology (AJCST)
Cloud Computing Security Using Cryptographic AlgorithmsAuthor : K. Srilakshmi and P. Bhargavi
Volume 8 No.3 Special Issue:June 2019 pp 76-80
Cloud computing is a new and fast emergent technology in field of computation and data storage as a service at very eye-catching facilities. It provides fast and well organized on demand services for storage, network, software, and hardware through the Internet. Applications that run in the cloud can balance various elements comprising load balancing, bandwidth, security and size of data. Major problems to cloud adoption are data privacy and security, because the data owner and the service provider are not within the similar trusted domain. Safety issues are increasingly significant in lowest layer Infrastructure as a Service (IaaS) to higher Platform as a Service (PaaS). In this paper we present range of dissimilar techniques or security algorithms exploiting to uphold the secrecy and security of the cloud with cryptographic algorithms.
Cloud Computing, Data Security Challenges, Cryptographic Algorithms
 K. Jeffery, and B. Neidecker-Lutz, “The Future of Cloud Computing Opportunities for European Cloud Computing Beyond 2010”, European Commission Information Society and Media,. Nov. 2012.
 R. Barga, J. Bernabeu Auban, and D. Gannon, “Cloud computing architecture and application programming,” in Proc SIGACT News, 2009, Vol. 40, No. 2, pp. 94-95.
 Shakeeba S. Khan, and R.R. Tuteja, “Security in Cloud Computing using Cryptographic Algorithms” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, No.1, pp.1-7, 2015.
 Nia Ramadianti Putri, Medard Charles and M. Ganga, “Enhancing Information Security in Cloud Computing Services using SLA Based Metrics”, M. Eng. thesis, School of Computing Blekinge Institute of Technology, Computer Science, Sweden, March, 2011.
 Neha Jain and Gurpreet Kaur, “Implementing DES Algorithm in Cloud for Data Security” VSRD International Journal of Computer science and Information Technology, Vol. 2, No.4, pp. 316-321, 2012.
 J.H. Allen, S. Barnum, and R.J. Ellison, “Software Security Engineering: A Guide for Project Managers”, Addison Wesley Professional, 2008.
 SANS (2010) home page on SANS Information Security resources. [Online] Available: http://www.sans. org/informationsecurity.php
 COBIT 4.1(2007) home page on IG Institutions [Online] Available at: https://www.saca.org/knowledge center/cobit/documents /COBIT4.pdf.
 Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy”, O’Reilly, 2009.
 Elminaam, DiaaSalama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, International Journal of Computer Science and Network Security, Vol. 8, No.12, pp. 280-286, 2008.
 Aman Kumar, Sudesh Jakhar, and Sunil Makka, “Comparative Analysis between DES and RSA Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.2, No.7, pp. 66-71, July 2012.
 William Stalling, “Cryptography and Network Security: Principles and Practice”, 6th ed., Pearson Education, 2014.
 C. Sanchez-Avila and R. Sanchez Reillol, “The Rijndael block cipher (AES proposal): a comparison with DES”, in Proc., 35th IEEE International Carnahan Conference on Security Technology, pp.134-138, 2001
 Abha Sachdev, and Mohit Bhansali, “Enhancing Cloud Computing Security using AES Algorithm”, International Journal of Computer Applications, Vol. 67, No.9, pp.87-92, 2013.
 P. Suresh, et al., “Secure Cloud Environment Using RSA Algorithm”, International Research Journal of Engineering and Technology, Vol.03, No.2, pp.144-148, 2016.
 William Stallings, “Cryptography and Network Security: Principles and Practice”, 5th ed. Prentice Hall, 2011.
 Gurpreet Singh, and Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, Vol. 67, No.19, pp. 33-38, 2013.
 N. Ziong, tropsoft home page on DES [Online] Available at: http://www.tropsoft.com/strongenc/des., 2014.
 V. Biksham, and D. Vasumathi, “Query based computations on encrypted data through homomorphic encryption in CC security”, in Proc. IEEE International Conference on Electrical, Electronics, and Optimization Techniques, pp. 34-37, 2016.
 Peidong Sha, and Zhixiang Zhu, “The Modification Of RSA Algorithm To Adapt Fully Homomorphic Encryption Algorithm In CC”, in Proc. IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 123-126, 2016.
 Viney Pal Bansal, and Sandeep Singh, “A Hybrid Data Encryption Technique using RSA and Blowfish for CC on FPGAs”, in Proc. IEEE International Conference on Recent Advances in Engineering & Computational Sciences, pp. 57-60, 2015.