International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 113 - Number 12 |
Year of Publication: 2015 |
Authors: Aayushi Priya, Y.k.rana, B.p.patel |
10.5120/19882-1896 |
Aayushi Priya, Y.k.rana, B.p.patel . Design and Implementation of an Algorithm to Enhance Cloud Security. International Journal of Computer Applications. 113, 12 ( March 2015), 41-47. DOI=10.5120/19882-1896
Cloud computing concept has been envisioned as architecture of the next generation for Information Technology (IT) enterprise. The Cloud computing idea offers with dynamic scalable resources provisioned as examine on the Internet. It allows access to remote computing services and users only have to pay for what they want to use, when they want to use it. But the security of the information which is stored in the cloud is the major issue for a cloud user. Cloud computing has been flourishing in past years because of its ability to provide users with on-demand, flexible, reliable, and low-cost services. With more and more cloud applications being available, data security becomes an important issue to the cloud. In order to make sure security of the information at cloud data storage end, a design and implementation of an algorithm to enhance cloud security is proposed. With a concept, where the proposed algorithm (PA) combines features of two other existing algorithms named Ceaser cipher and Attribute based cryptography (ABC). In this research work, text information are encrypting using "Caesar Cipher" then produced cipher text again encrypted by using proposed algorithm (PA) with the help of private key of 128 bits. And in the last step of encryption process, based on ABC, attribute related to cipher text is stored along with cipher text generated after encryption which provide two-step authentication during decryption process. A security approach is designed and developed for data security concept regarding higher confidentiality and authenticity for the cloud data at cloud storage end with experiment analysis to authenticate its efficiency. From the result analysis it is clearly seen that the proposed technique has better Avalanche Effect and execution time than existing technique and hence can be incorporated in the process of encryption/decryption of any plain text or on any key value.