Framework For Secure Cloud Data Communication
Nitika Aggarwal, Abhishek Choudhary, Maalvika Bachani, Mrs. Rachna Jain
Index Terms: Algorithms, Cloud Computing, Ciphertext, Decryption, Encryption, Lagrange’s basis polynomial equation, Security, Shamir’s secret sharing algorithm, Threshold value, Zero Padding
Abstract: Cloud computing is an emerging technology where all the computing resources are shared on the cloud rather than having local servers or personal devices to handle applications. Encrypting data residing on the cloud database is required to prevent unauthorized access of confidential and critical information and the subsequent modification of the information for personal benefit. As all the organizational information resides on the computers, security of this data is of utmost importance. Shamir’s secret sharing algorithm is one successful way of encrypting the data. In this research paper we have developed a new encrypting algorithm based on symmetric key cryptography. We have used logical operations like XOR and zero padding. The Shamir’s secret sharing algorithm would act on the key generated by our proposed encryption algorithm. This algorithm is an efficient and a simple strategy for secure communication in cloud computing.
 Khalil Challita, HikmatFarhat. Combining Steganography and Cryptography: New Directions. In International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): 199-208.The Society of Digital Information and Wireless Communications, 2011 (ISSN 2220-9085)
 Jianfeng Yang, Zhibin Chen. Cloud Computing Research and Security Issues.
 Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, MateiZaharia. Above the Clouds: A Berkeley View of Cloud Computing. In Above the Clouds: A Berkeley View of Cloud Computing.
 G. Jai Arul Jose, C. Sajeev. Implementation of Data Security in Cloud Computing. In International Journal of P2P Network Trends and Technology- July to Aug Issue 2011.
 Lisa J. Sotto, Bridget C. Treacy, Melinda L. McLellan. Privacy and Data Security Risks in Cloud Computing.
 SeongHan Shin, KazukuniKobara. Towards Secure Cloud Storage. In demo for CloudCom2010
 Robert Denz, Stephen Taylor. A survey on securing the virtual cloud. In Journal Of Cloud Computing, a SpringerOpen Journal.