CFP last date
20 January 2025
Reseach Article

Design and Implementation of an Algorithm to Enhance Cloud Security

by Aayushi Priya, Y.k.rana, B.p.patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 12
Year of Publication: 2015
Authors: Aayushi Priya, Y.k.rana, B.p.patel
10.5120/19882-1896

Aayushi Priya, Y.k.rana, B.p.patel . Design and Implementation of an Algorithm to Enhance Cloud Security. International Journal of Computer Applications. 113, 12 ( March 2015), 41-47. DOI=10.5120/19882-1896

@article{ 10.5120/19882-1896,
author = { Aayushi Priya, Y.k.rana, B.p.patel },
title = { Design and Implementation of an Algorithm to Enhance Cloud Security },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 12 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 41-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number12/19882-1896/ },
doi = { 10.5120/19882-1896 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:48.153136+05:30
%A Aayushi Priya
%A Y.k.rana
%A B.p.patel
%T Design and Implementation of an Algorithm to Enhance Cloud Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 12
%P 41-47
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing concept has been envisioned as architecture of the next generation for Information Technology (IT) enterprise. The Cloud computing idea offers with dynamic scalable resources provisioned as examine on the Internet. It allows access to remote computing services and users only have to pay for what they want to use, when they want to use it. But the security of the information which is stored in the cloud is the major issue for a cloud user. Cloud computing has been flourishing in past years because of its ability to provide users with on-demand, flexible, reliable, and low-cost services. With more and more cloud applications being available, data security becomes an important issue to the cloud. In order to make sure security of the information at cloud data storage end, a design and implementation of an algorithm to enhance cloud security is proposed. With a concept, where the proposed algorithm (PA) combines features of two other existing algorithms named Ceaser cipher and Attribute based cryptography (ABC). In this research work, text information are encrypting using "Caesar Cipher" then produced cipher text again encrypted by using proposed algorithm (PA) with the help of private key of 128 bits. And in the last step of encryption process, based on ABC, attribute related to cipher text is stored along with cipher text generated after encryption which provide two-step authentication during decryption process. A security approach is designed and developed for data security concept regarding higher confidentiality and authenticity for the cloud data at cloud storage end with experiment analysis to authenticate its efficiency. From the result analysis it is clearly seen that the proposed technique has better Avalanche Effect and execution time than existing technique and hence can be incorporated in the process of encryption/decryption of any plain text or on any key value.

References
  1. Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf, " NIST Cloud Computing Reference Architecture" US Department of Commerce, Gaithersburg, MD, 2011.
  2. P. Mell and T. Grance, "The nist definition of cloud computing", special publication 800-145," US Department of Commerce, Gaithersburg, MD, 2011.
  3. Bhaskar Prashad Rimal, Eunmi choi, Ian Lumb, "A Taxonomy and Survey of Cloud Computing System", International Joint Conference on INC, IMS and IDC, IEEE, 2009.
  4. Wei-Tek Tsai, Xin Sun, Janaka Balasooriya, "Service-Oriented Cloud Computing Architecture", Seventh International Conference on Information Technology, IEEE 2010.
  5. Mohammad Sajid, Zahid Raza, "Cloud Computing: Issues & Challenges", International Conference on Cloud, Big Data and Trust 2013.
  6. Ramgovind S, Eloff MM, Smith E, "The Management of Security in Cloud Computing", IEEE, 2010.
  7. Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina, Eduardo B Fernandez "An analysis of security issues for cloud computing", Journal of Internet Services and Applications, Springer, 2013.
  8. Sanjay Dahal, "Security Architecture For Cloud Computing Platform", 2012.
  9. Sherif El-etriby, Eman M. Mohamed, "Modern Encryption Techniques for Cloud Computing Randomness and Performance Testing", ICCIT 2012.
  10. Hamdan M. Al-Sabri, Saleh M. Al-Saleem "Building a Cloud Storage Encryption (CSE) Architecture for Enhancing Cloud Security" IJCSI International Journal of Computer Science Issues, Volume 10, Issue 2, 2013.
  11. Mao-Pang Pang Lin, Trend Micro, Taiwan, Wei-Chih Hong, Chih-Hung Chen, Chen-Mou Cheng "Design and Implementation of Multi-user Secure Indices for Encrypted Cloud Storage" International Conference on Privacy, Security and Trust, IEEE, 2013.
  12. Shivani Gambhir, Ajay Rawat, Rama Sushil, "Cloud Auditing: Privacy Preserving using Fully Homomorphic Encryption in TPA", International Journal of Computer Applications, Volume 80, Number 14, 2013.
  13. Cong Wang, S. -M. Chow, Qian Wang, Kui Ren , Wenjing Lou "Privacy-Preserving Public Auditing for Secure Cloud Storage", IEEE Transactions on Cloud Computing, Volume 62, Issue 2, 2013.
  14. Shuaishuai Zhu ; Xiaoyuan Yang ; Xuguang Wu "Secure Cloud File System with Attribute Based Encryption" IEEE International Conference on Intelligent Networking and Collaborative Systems, 2013.
  15. Chao Yang ; Weiwei Lin ; Mingqi Liu "A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security" IEEE International Conference on Emerging Intelligent Data and Web Technologies, 2013.
  16. Sengupta, N. , Holmes J. "Designing of Cryptography Based Security System for Cloud Computing" IEEE International conferences on Cloud & Ubiquitous Computing & Emerging Technologies, 2013.
  17. Preeti Garg, Dr. Vineet Shanna, "An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function", IEEE, 2014.
  18. Neha Tirthani, Ganesan R "Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography".
  19. Ganesh Patidar, Nitin Agrawal, Sitendra Tarmakar, "A block based Encryption Model to improve Avalanche Effect for data Security", International Journal of Scientific and Research Publications, Volume 3, Issue 1, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cryptography Encryption Decryption Security issues Confidentiality Authentication.