IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR >> Volume 8 - Issue 10, October 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Implementation Of Multi-Security Algorithms In Cloud To Achieve Confidentiality And Apply Authentication

[Full Text]

 

AUTHOR(S)

Arpit Agrawal, Ankit Yadav

 

KEYWORDS

AES, BLOWFISH, Cloud Computing, ECC, Security, SLA, Resource Pooling

 

ABSTRACT

Cloud computing originates with many features to serve users with resources, services and wide storage for data. If any kind of data is stored then it requires security, so security of data becomes significant issue in cloud. Over the time, this issue needs to be resolved for the security purpose. Due to the sharing of distributed resources through an insecure network in an open environment, cloud faces security issues therefore easy access of data is possible from anywhere. Existing work employed security using symmetric algorithm AES, which suffers with the issue of stolen of key while transmission. Performance of existing work is also not satisfying and is achieved in proposed work by decreasing delay time. Presented work achieved authentication, confidentiality and integrity to maintain security and privacy.

 

REFERENCES

[1] Bih-Hwang Lee, Ervin Kusuma Dewi, “Data Security in Cloud Computing Using AES under HEROKU Cloud”. 27th Wireless and Optical Communications Conference, IEEE (WOCC2018), 2018.
[2] Information Security Briefing Cloud Computing, Vol.1, Center of The Protection of National Infrastructure CPNI by Deloitte, 2010, p. 71.
[3] L. Foster, Y. Zhao, I. Raicu, S.Y. Lu, Cloud computing and grid computing 360-degree compared, in: Grid Computing Environments Workshop, GCE’08, Austin, TX, Nov. 12-16, 2008, pp. 1-10.
[4] The NIST Definition of Cloud Computing, National Institute of Science and Technology, p.7. Retrieved July 24 2011.
[5] J.W. Rittinghouse, J.F. Ransome, Cloud Computing Implementation, Management, and Security, CRC Press, Boca Raton, 2009.
[6] Deyan Chen; Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol.1, no., pp.647-651, 23-25 March 2012.
[7] Vishwanath s Mahalle, Aniket K Shahade, “Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm”, “Power, Automation and communication (INAP)”, 2014.
[8] V. Chang, C.-S. Li, D. De Roure, G. Wills, R.J. Walters, and C. Chee, “The financial clouds review”, Cloud Computing Advancements in Design, Implementation, and Technologies, vol. 125, 2012.
[9] A. Lopez-Alt, E. Tromer, and V. Vaikuntanathan, “On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption”, in Proceedings of the forty-fourth annual ACM symposium on Theory of computing. ACM, 2012, pp. 1219-1234.
[10] M. Brenner, J. Wiebelitz, G. Von Voigt, and M. Smith, “Secret program execution in the cloud applying homomorphic encryption”, in 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011). IEEE,2011, PP.114-119.