IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 7, July 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Advances In Security And Privacy Of Data In Cloud Computing: Survey And Discussions

[Full Text]

 

AUTHOR(S)

Vijaita Kashyap, Shikha Jain

 

KEYWORDS

Cloud computing, Key, encryption, Decryption.

 

ABSTRACT

In recent years the use of cloud computing is rapidly growing day by day, as we know that the cloud computing mechanism provides the storage of large amount of data, any user can access the data from anywhere with the help of internet. Cloud computing provide to users a centralized virtual environment and infrastructure without using the cost for physical or active infrastructure in a multiple way. Cloud provides the access of large multimedia data such as the video, audio, image and text etc. In this paper, we have presents the comparative performance analysis for the key generation, encryption time and decryption time for the encryption and decryption standard techniques.

 

REFERENCES

[1]. Attar N, Shahin M, “A Proposed Architecture for Data Security in Cloud Storage Space”, Journal of Biostatistics and Biometric Applications, Vol-3, 2018, pp 1-7.
[2]. Nidhi Shah, Digvijay Mahida, “Data Security in Cloud Computing : A Comprehensive Survey”, International Conference on Current Research Trends in Engineering and Technology, 2018, pp 434-438.
[3]. D.I. George Amalarethinam, H.M. Leena, “A Comparative Study on various Symmetric Key Algorithms for enhancing Data Security in Cloud Environment”, International Journal of Pure and Applied Mathematics, 2018, pp 85-94.
[4]. R. Velumadhava Rao, K. Selvamani, S. Kanimozhi, A. Kannan, “Hierarchical group keymanagement for secure data sharing in a cloud-based environment”, John Wiley & Sons, Ltd., 2018, pp 1-16.
[5]. Antonio Celesti, Maria Fazio, Antonino Galletta, Lorenzo Carnevale, Jiafu Wanb, Massimo Villari, “An approach for the secure management of hybrid cloud–edge Environments”, Future Generation Computer Systems, Elsevier ltd. 2019, pp 1–19.
[6]. Yongkai Fan, Xiaodong Lin, Wei Liang, Gang Tan, Priyadarsi Nanda, “A secure privacy preserving deduplication scheme for cloud computing”, Elsevier ltd. 2019, pp 127-135.
[7]. Y. Kiran Kumar, R. Mahammad Shafi, “Model-Driven Platform for Service Security and Framework for Data Security and Privacy Using Key Management in Cloud Computing”, International Research Journal of Engineering and Technology, Vol-6, 2019, pp 1464-1470.
[8]. Shahin Fatima, Shish Ahmad, “Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing”, International Journal of e-Collaboration, Vol-16, 2020, pp 1-15.