We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing

by Manpreet Kaur, Rajbir Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 18
Year of Publication: 2013
Authors: Manpreet Kaur, Rajbir Singh
10.5120/12167-8127

Manpreet Kaur, Rajbir Singh . Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing. International Journal of Computer Applications. 70, 18 ( May 2013), 16-21. DOI=10.5120/12167-8127

@article{ 10.5120/12167-8127,
author = { Manpreet Kaur, Rajbir Singh },
title = { Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 18 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number18/12167-8127/ },
doi = { 10.5120/12167-8127 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:11.427847+05:30
%A Manpreet Kaur
%A Rajbir Singh
%T Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 18
%P 16-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Cloud computing technology there are a set of important policy issues, which include issues of privacy, security, anonymity, telecommunications capacity, government surveillance, reliability, and liability, among others. But the most important between them is security and how cloud provider assures it. Generally, Cloud computing has several customers such as ordinary users, academia, and enterprises who have different motivation to move to cloud. If cloud clients are academia, security effect on performance of computing and for them cloud providers have to find a way to combine security and performance. For enterprises the most important problem is also security but with different vision. For them high performance may be not as critical as academia. This paper discusses to which degree this scepticismis justified, by presenting the Cipher Cloud. The Cipher Cloud is a framework that lets users keep their data confidentially on public cloud frameworks. To achieve this, the Cipher Cloud uses a two-step encryption process, in by which all the data sent from a client to a cloud server or vice versa is kept totally encrypted and confidential. The most thorough security controls needed to protect the most sensitive data may not be guaranteed in public cloud computing architectures, while they can be realized in private cloud computing architectures. As the most promising cloud computing approach, this paper suggests selective encryption techniques, which almost gives the data confidentiality just like private cloud models.

References
  1. Andrzejak. 2010, Exploiting Non-Dedicated Resources for Cloud Computing ,In Proceedings of 12th IEEE/IFIP Network Operations & Management Symposium(NOMS 2010),Osaka Japan.
  2. Bertino, R. Ferrini 2009, Privacy- Preserving Digital Identity Management for Cloud Computing vol. 32- No. 2, IEEE Data Eng. Bull.
  3. D L. Ponemon 2010, Security of Cloud Computing Users, vol. 34-No. 2, International Journal of Computer Theory and Engineering.
  4. Dawson 2002, Maximizing sharing of protected information, vol. 64-No. 3, Journal of Computer and System Sciences.
  5. Pieters, W. 2006, Acceptance of Voting Technology: Between Confidence and Trust. In K. Stolen (Eds. ), I Trust. , Computer science press.
  6. Sameer Raja 2011, Cloud Computing: The Fifth Generation of Computing, International Conference on Communication Systems and Networking.
  7. Sarathy, R, dhar, K. 2006, Secure and useful data sharing Decision Support System, vol. 42-No. 1, Computer Science press.
  8. Xing Zhou, Xiaofei Tang 2011, Research and Implementation of RSA Algorithm for Encryption and Decryption, Department of Computer Science and Technology Harbin, china.
Index Terms

Computer Science
Information Sciences

Keywords

Google App Engine Eclipse IDE