IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Develop Cloud Security in Cryptography Techniques using DES-3L Algorithm method in Cloud Computing

[Full Text]

 

AUTHOR(S)

Dr. D. Arivazhagan, R Kirubakaramoorthi

 

KEYWORDS

Web service, Cloud Computing, protection issues, Infrastructure, cryptographic Algorithm.

 

ABSTRACT

Cloud computing is an articulation used to depict a collection of enlisting thoughts that incorporate innumerable related through a continuous correspondence framework, for instance, the Internet. Dispersed registering is a course of action of IT Facilities such as connection between computers, system programming, data storing, computer machinery, program for operating machines, and sources. These facilities are given to the client over a internet/intranet. The IT facilities of Cloud Computing are passed on by outcast supplier who has the foundation. Focal points of appropriated storing are essential get to recommends get to the degree that anyone is concerned wherever, at any rate, at whatever point, adaptability, versatility, cost ampleness, and high endurance of the information. Verifying information is a difficult issue in the here and now outline. It is very difficult get data security in cloud because the data travelled through internet. The Cloud security and implementation are the main problem during implementation. Because of this advantage, every company who wants to utilize this facilities expecting the facility provider has to protect their data from unauthorized users. To stay the Cloud infers secure the meds (calculations) and limit (databases encouraged by the Cloud provider). Disseminated figuring is an amazingly outstanding development in the field of passing on organizations to their customer. In Cloud figuring development there are a course of action of basic system issues, which consolidate issues of insurance, security, anonymity, media interchanges limit, government perception, enduring quality, and hazard, among others. All around, Cloud handling has a couple of customers, for instance, normal customers, the academic network, and attempts who have differing motivation to move to cloud. In this investigation paper, the proposed work plan is to discard the stresses with respect to data guard using cryptographic procedures to overcome the protection in cloud as per the expectation of customers.

 

REFERENCES

[1] AL.Jeeva, Dr.V.Palanisamy And K.Kanagaram “Comparative Analysis Of Performance Efficiency And Security Measures Of Some Encryption Algorithms” International Journal Of Engineering Research And Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue 3, pp.30333037, May-Jun 2012.
[2] Neha Jain and Gurpreet Kaur ‘Implementing DES Algorithm in Cloud for Data Security” VSRD International Journal of CS & IT Vol. 2 Issue 4, pp. 316-321, 2012.
[3] Brian Hay, Kara Nance, Matt Bishop, “Storm Clouds Rising: Security Challenges for IaaS Cloud Computing” Proceedings of the 44th Hawaii International Conference on System Sciences, pp.1-7, 2011. 4. Kevin Curran, Sean Carlin and Mervyn Adams, “Security issues in cloud computing”, Elixir Network Engg.38 (2011), pp.4069-4072, August 2011.
[4] Randeep Kaur, Supriya Kinger, "Analysis of Security Algorithms in Cloud Computing" International Journal of Application or Innovation in Engineering & Management (ISSN 2319 - 4847),Volume 3 Issue 3, pp.171-176, March 2014.
[5] Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI, “Homomorphic Encryption Applied to the Cloud Computing Security”, World Congress on Engineering, Volume I, ISBN: 978-988-19251-3-8; ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online) , 2012.
[6] Dr. Chander Kant and Yogesh Sharma, "Enhanced Security Architecture for Cloud Data Security" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3 Issue 5, pp.571-575, May 2013.
[7] L. M. Kaufman, "Data security in the world of cloud computing,"IEEE Security & Privacy Magazine, vol. 7, pp. 61-64, July2009.
[8] S C Rachana, Dr. H S Guruprasad, “Emerging Security Challenges in Cloud Computing ”, International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 3 Issue 2, pp.485-490, March 2014.
[9] Shakeeba S. Khan and R.R. Tuteja, “Security in Cloud Computing using Cryptographic Algorithms”, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol. 3, Issue 1, pp. 148- 154, January 2015.
[10] G. Devi , M. Pramod Kumar, “Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm” International Journal Of Computer Trends And Technology Volume 3 Issue 4, ISSN: 2231-2803, pp. 592-596,2012.
[11] Rashmi Nigoti, Manoj Jhuria and Dr.Shailendra Singh, "A Survey of Cryptographic Algorithms for Cloud Computing" International Journal of Emerging Technologies in Computational and Applied Sciences,Vol. 4, pp.141-146, March-May 2013.
[12] Wayne Jansen ,Timothy Grance, "Guidelines on Security and Privacy in Public Cloud Computing", NIST Special Publication,NIST SP - 800144 ,80 pp., 2011.
[13] Silki Jain and Abhilasha Vyas, “An Improved Security Framework for Cloud Environment using ECC algorithm”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), Volume 6 Issue I, pp. 635-641, January 2018.
[14] G. Vennila, Dr. D. Arivazhagan, Dr. R.Jayavadivel, “Experimental Analysis Of RPL Routing Protocol In IOT”, International Journal of Scientific & Technology Research Volume 8, Issue 10, October 2019.
[15] G.Vennila, Dr.D.Arivazhagan, N. Manickasankari, “Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm”, International Journal of Engineering and Technology (IJET), Vol 6 No 5 Oct-Nov 2014.