International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 175 - Number 11 |
Year of Publication: 2020 |
Authors: Abhishek Sonar, Prajwal Dubey, Vineet Iyer |
10.5120/ijca2020920584 |
Abhishek Sonar, Prajwal Dubey, Vineet Iyer . Protection of User Data in Cloud Computing. International Journal of Computer Applications. 175, 11 ( Aug 2020), 5-10. DOI=10.5120/ijca2020920584
There has been an increase in the development of Cloud Computing, thus there is a need for people to know how their personal information be made more secure with the assistance of upcoming technology in the field of cryptography. The problem in the older systems can be defined as although applications are often created with unique features such as data tagging; whose main motive is to prevent unauthorized access to user data, illegal access to data is still possible through some types of application vulnerability (e.g., In March 2009 there was illegal access to Google's documents and spreadsheets). Some cloud providers get their data and various applications corroborated by third-party application security tools, still, there is a need for the establishment of a process that is dedicated to only one organization. In this paper, we have given more emphasis on Symmetric key algorithms e.g., AES (which stands for advanced encryption system), DES (which stands for data encryption system), Blowfish because the information which is stored on the cloud through these algorithms is much more secure and protected as compared to an asymmetric algorithm. In this journal, we have carefully studied security issues, which are faced by many users in the process of storage or transferring data through cloud computing from one place to another. We have presented a detailed and emblematic study of how can various encryption and decryption algorithms make the overall process of communication reliable, smooth, and secure. We have also compared important distinguishing factors between algorithms like key size, scalability, the extent of security, etc.