IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 2, February 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Framework For Secure Cloud Data Communication

[Full Text]

 

AUTHOR(S)

Nitika Aggarwal, Abhishek Choudhary, Maalvika Bachani, Mrs. Rachna Jain

 

KEYWORDS

Index Terms: Algorithms, Cloud Computing, Ciphertext, Decryption, Encryption, Lagrange’s basis polynomial equation, Security, Shamir’s secret sharing algorithm, Threshold value, Zero Padding

 

ABSTRACT

Abstract: Cloud computing is an emerging technology where all the computing resources are shared on the cloud rather than having local servers or personal devices to handle applications. Encrypting data residing on the cloud database is required to prevent unauthorized access of confidential and critical information and the subsequent modification of the information for personal benefit. As all the organizational information resides on the computers, security of this data is of utmost importance. Shamir’s secret sharing algorithm is one successful way of encrypting the data. In this research paper we have developed a new encrypting algorithm based on symmetric key cryptography. We have used logical operations like XOR and zero padding. The Shamir’s secret sharing algorithm would act on the key generated by our proposed encryption algorithm. This algorithm is an efficient and a simple strategy for secure communication in cloud computing.

 

REFERENCES

[1] Khalil Challita, HikmatFarhat. Combining Steganography and Cryptography: New Directions. In International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): 199-208.The Society of Digital Information and Wireless Communications, 2011 (ISSN 2220-9085)

[2] http://www.tutorialspoint.com/cloud_computing/cloudcomputing_overview.htm

[3] Jianfeng Yang, Zhibin Chen. Cloud Computing Research and Security Issues.

[4] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, MateiZaharia. Above the Clouds: A Berkeley View of Cloud Computing. In Above the Clouds: A Berkeley View of Cloud Computing.

[5] G. Jai Arul Jose, C. Sajeev. Implementation of Data Security in Cloud Computing. In International Journal of P2P Network Trends and Technology- July to Aug Issue 2011.

[6] Lisa J. Sotto, Bridget C. Treacy, Melinda L. McLellan. Privacy and Data Security Risks in Cloud Computing.

[7] SeongHan Shin, KazukuniKobara. Towards Secure Cloud Storage. In demo for CloudCom2010

[8] Robert Denz, Stephen Taylor. A survey on securing the virtual cloud. In Journal Of Cloud Computing, a SpringerOpen Journal.