CFP last date
20 January 2025
Reseach Article

Security Enhancement in Cloud Storage using ARIA and Elgamal Algorithms

by Navdeep Kaur, Heena Wadhwa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 171 - Number 9
Year of Publication: 2017
Authors: Navdeep Kaur, Heena Wadhwa
10.5120/ijca2017915116

Navdeep Kaur, Heena Wadhwa . Security Enhancement in Cloud Storage using ARIA and Elgamal Algorithms. International Journal of Computer Applications. 171, 9 ( Aug 2017), 19-23. DOI=10.5120/ijca2017915116

@article{ 10.5120/ijca2017915116,
author = { Navdeep Kaur, Heena Wadhwa },
title = { Security Enhancement in Cloud Storage using ARIA and Elgamal Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 171 },
number = { 9 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume171/number9/28210-2017915116/ },
doi = { 10.5120/ijca2017915116 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:59.717396+05:30
%A Navdeep Kaur
%A Heena Wadhwa
%T Security Enhancement in Cloud Storage using ARIA and Elgamal Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 171
%N 9
%P 19-23
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is not an improvement, excluding an income towards constructs information technology services that utilize superior computational authority & better storage space utilization. The major centre of Cloud Computing starts when the supplier vision as irrelevant hardware associated to sustain down-time on some appliance in the system. It is not a modification in the user viewpoint. As well, the user software picture should be simply convertible as of one confuse to a new. Though cloud computing is embattled to offer better operation of possessions using virtualization method and to receive up a great deal of the job load from the customer and provides safety also. Cloud Computing is a rising technology with joint property and lower cost that relies on pay per use according to the client order. Due to its description, it may face plenty of intimidation and trouble in the scopes of safety. In this thesis, we are going to implement ARIA and ELGAMAL algorithm over a cloud network for securing cloud data storage structure. The whole simulation is taken place in Net environment.

References
  1. Adjeroh, Donald A., & Kingsley C. Nwosu. "Multimedia database management—requirements & issues." IEEE multimedia 4.3 (1997): 24-33
  2. Anderson, Ross, Eli Biham, & Lars Knudsen. "Serpent: A proposal for the advanced encryption standard." NIST AES Proposal 174 (1998).
  3. Biswas, Rajorshi, Shibdas Bandyopadhyay, & Anirban Banerjee. "A fast implementation of the RSA algorithm using the GNU MP library." IIIT–Calcutta, National workshop on cryptography. 2003.
  4. Xu, Dingbang, & Peng Ning. "Privacy-preserving alert correlation: a concept hierarchy based approach." Computer Security Applications Conference, 21st Annual.2013.
  5. Cox, Ingemar J., et al. "Secure spread spectrum watermarking for multimedia." Image Processing, IEEE Transactions on 6.12 (1997): 1673-1687.
  6. Elbirt, Adam J., & Christof Paar. "An FPGA implementation & performance evaluation of the serpent block cipher." Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays. ACM, 2000.
  7. Elgamal, Taher. "Method and apparatus for providing electronic accounts over a public network." U.S. Patent No. 6,138,107. 24 Oct. 2000.
  8. Islam, Mohammad Manzurul, Sarwar Morshed, & Parijat Goswami. "Cloud computing: A survey on its limitations & potential solutions." International Journal of Computer Science Issues 10, no. 4: 159-163.
  9. Kalaivani, K., & B. Sivakumar. "Survey on multimedia data security."International Journal of Modeling & Optimization 2.1 (2012): 36-41.
  10. Kawle, Pravin, et al. "Modified Advanced Encryption Standard.", International Journal of Soft Computing & Engineering, Volume-4, Issue-1, March 2014.
  11. Kiltz, Eike, and Krzysztof Pietrzak. "Leakage resilient elgamal encryption." In International Conference on the Theory and Application of Cryptology and Information Security, pp. 595-612. Springer Berlin Heidelberg, 2010.
  12. LI, Baoping, & Yan WANG. "Analysis of the Advantages & Disadvantages of Multimedia Teaching in Colleges.",2010.
  13. Li, Shenhua, and Chunyan Song. "Improved impossible differential cryptanalysis of ARIA." Information Security and Assurance, 2008. ISA 2008. International Conference on. IEEE, 2008.
  14. Li, Wei, Dawu Gu, and Juanru Li. "Differential fault analysis on the ARIA algorithm." Information Sciences 178, no. 19 (2008): 3727-3737.
  15. Menezes, Alfred J. Elliptic curve public key cryptosystems. Vol. 234. Springer Science & Business Media, 2012.
  16. Prof. Radha.S.Shirbhate, 2Anushree A.Yerawar, 3Ankur M. Hingane,” Features Preserving Data Encryption Used to Secure Multimedia Data”, International Journal of Emerging Technology & Advanced Engineering, Volume 2, Issue .1, January 2012.
  17. Schnorr, Claus Peter, and Markus Jakobsson. "Security of signed ElGamal encryption." In International Conference on the Theory and Application of Cryptology and Information Security, pp. 73-89. Springer Berlin Heidelberg, 2000.
  18. Shamily, P. Bindhu, and S. Durga. "A Review on Multimedia Cloud Computing, its Advantages and Challenges." International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1.10 (2012): pp-130.
  19. Singh, Ajit, & Swati Malik. "Securing Data by Using Cryptography with Steganography." International Journal of Advanced Research in Computer Science & Software Engineering (IJARCSSE) ISSN 2277 (2013).
  20. Wolfgang, Raymond B., & Edward J. Delp III. "Overview of image security techniques with applications in multimedia systems." Voice, Video, & Data Communications. International Society for Optics & Photonics, 1998.
  21. Xu, Dingbang, & Peng Ning. "Privacy-preserving alert correlation: a concept hierarchy based approach." Computer Security Applications Conference, 21st Annual.2013.
  22. Yang, Sangwoon, Jinsub Park, and Younggap You. "The smallest ARIA module with 16-bit architecture." Information Security and Cryptology–ICISC 2006. Springer Berlin Heidelberg, 2006. 107-117.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing multimedia data security ElGamal Algorithm Aria Cipher Algorithm existing issues