CFP last date
20 January 2025
Reseach Article

Security Algorithms in Cloud Computing

by Rohini Bhardwaj, Tejinder Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 5
Year of Publication: 2017
Authors: Rohini Bhardwaj, Tejinder Sharma
10.5120/ijca2017915827

Rohini Bhardwaj, Tejinder Sharma . Security Algorithms in Cloud Computing. International Journal of Computer Applications. 178, 5 ( Nov 2017), 33-37. DOI=10.5120/ijca2017915827

@article{ 10.5120/ijca2017915827,
author = { Rohini Bhardwaj, Tejinder Sharma },
title = { Security Algorithms in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 178 },
number = { 5 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number5/28673-2017915827/ },
doi = { 10.5120/ijca2017915827 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:49:36.582714+05:30
%A Rohini Bhardwaj
%A Tejinder Sharma
%T Security Algorithms in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 5
%P 33-37
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing provides services over web with powerful resizable resources. Cloud computing facilities give advantages to the end user in terms of cost and ease of use. Cloud computing services require security during transfer of important data and censorious applications to shared and public cloud environments. To store information on cloud, client needs to exchange their information to the outsider who will deal with and store the information. So it is imperative for any association to secure that information. Information is said to be secured if the classification, accessibility, security is available. Numerous calculations have been use to secure the information. In this paper diverse calculations will examine for security of information in distributed computing.

References
  1. Er Ashima Pansotra and Er Simar Preet Singh "Cloud security algorithms" International Journal of Security and Its Applications vol 9, Issue no.10, pp 353-360, 2015.
  2. Mohammad Ubaidullah Bokhari, QahtanMakkiShallal, YahyaKordTamandani “Security and privacy issues in cloud computing” International Conference on Computing for Sustainable Global Development (INDIACom), pp 896-900,2016.
  3. Manpreet kaur, Hardeep singh “A review of cloud computing security issue” International Journal of Advances in Engineering & Technology, vol 8, Issue no.3, pp 397- 403, june 2015.
  4. Tanvi Agrawal, S.K.Singh “A Review of cloud computing security issues” International Conference on Computing for Sustainable Global Development (INDIACom),pp 106-8, 2016.
  5. Akashdeep Bhardwaj, Dr. GVB Subrahmanyam, Dr. Vinay Avasthi, Dr. Hanumat Sastry “Security Algorithms for Cloud Computing Environment” 2015.
  6. Shakeeba S. Khan, Prof.R.R. Tuteja “Security in cloud computing using cryptographic algorithm” International Journal of Innovative Research in Computer and Communication Engineering, vol 3, Issue no.1, pp148-154, jan 2015.
  7. Varun Gandhi, Sanchit Bansal, Raveesh Kapoor, Aakarsh Dhawan “ Cloud computing security architecture implementing DES algorithm in cloud for data security” International Journal of Innovative Research in Engineering & Science, vol 9, Issue no.2, pp 11-19 sep 2013.
  8. Randeep kaur, Supriya kinger “ Analysis of security algorithm in cloud computing” International Journal of Application or Innovation in Engineering & Management (IJAIEM)vol.no.3, Issue 3, pp 171-176 march 2014.
  9. S.Manjula, Dr.M.Indra Devi, and R.Swathiya, “Division of data in cloud environment for secure data storage”, International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE), pp. 1-5, IEEE. 2016.
  10. Jaspreet singh, Sughandha Sharma “ Review on Cloud computing security issues and encryption techniques” International Journal of Engineering Development and Research vol 3, Issue no.2, 2015.
  11. Akshita bhandari, Ashutosh Gupta, and Debasis Das, “Secure algorithm for cloud computing and its application” 6th International Conference on Cloud System and Big Data Engineering (Confluence), pp. 188-192, IEEE. 2016.
  12. G.Prabu Kanna and V.Vasudevan, “Enhancing the security of user data using the keyword encryption and hybrid cryptographic algorithm in cloud” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 3688-3693, IEEE.2016.
  13. Punam V Maitri and ArunaVerma, “Secure file storage in cloud computing using hybrid cryptography algorithm” International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1635-1638 IEEE.2016.
  14. N.Jayapandian, Dr.A.M.J.Md.ZubairRahman, S.Radhikadevi and M.Koushikaa, “Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption” World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), pp. 1-4. IEEE. 2016.
  15. Vinay Pal Bansal and Sandeep Singh, “A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs” 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS),. pp.1-5. IEEE.2015.
  16. Majda Omer Elbasheer and Dr.Taring Mohammed, “Signing and verifying certificates by NTRU and RSA algorithm” International Conference on Cloud Computing (ICCC), pp. 1-4. IEEE.2015.
  17. Vijay Kumar Pant, Jyoti Prakashand Amit Asthana, “Three step data security model for cloud computing based on RSA and Stegnography techniques” International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 490-494. IEEE. 2015.
  18. Sakinah Ali Pitchay, Wail Abdo Ali Alhiangem, Farida Ridzuan and MadihahMohd Saudi, “A proposed systemconcept on enhancing the encryption and decryption method for cloud computing”17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim),  pp. 201-205. IEEE. 2015
  19. Mr.Rupesh R Bobde, Prof.AmitKhaparde and Prof.Dr.M.M.Raghuwanshi, “An approach for securing data on cloud using data slicing and cryptography” 9th International Conference on Intelligent Systems and Control (ISCO),  (pp. 1-5). IEEE. 2015.
  20. PreetiGarg and Dr.Vineet Sharma, “An efficient and secure data storage in mobile cloud computing through RSA and hash function”,International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 334-339. IEEE. 2014.
  21. Vishwanath S Mahalle and Aniket K Shahade, “Enhancing the data security in cloud by implementing hybrid(RSA & AES) encryption algorithm”,  International Conference on Power, Automation and Communication (INPAC), pp. 146-149. IEEE. 2014.
  22. Mr.Prashant Rewagad and Ms.Yogita Pawar, “Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance security in cloud computing” International Conference on Communication Systems and Network Technologies (CSNT),  pp. 437-439. IEEE.2013.
  23. Ashutosh Kumar Dubey, Animesh Kumar Dubey, MayankNamdev and Shiv Shakti Shrivastva, “Cloud user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment”, Sixth International Conference.  pp. 1-8. IEEE. 2012.
  24. Wenjun Fan and Xudong Chen, “Parallelization of RSA algorithm based on compute unified device architecture”, 9th International Conference.  pp. 174-178. IEEE.2010.
  25. Iuon-Chang Lin and Hsing-Lei Wang, “An improved digital signature scheme with fault tolerance in RSA”, Sixth International Conference.  pp. 9-12. IEEE.2010.
Index Terms

Computer Science
Information Sciences

Keywords

Keywords: cloud computing security information availability confidentiality hosts.