Enviar búsqueda
Cargar
262 265
•
0 recomendaciones
•
962 vistas
E
Editor IJARCET
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 4
Descargar ahora
Descargar para leer sin conexión
Recomendados
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU
Secure cloud storage
Secure cloud storage
ALIN BABU
Secry poster
Secry poster
ALIN BABU
IRJET- Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
E0952731
E0952731
IOSR Journals
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
Recomendados
SECRY - Secure file storage on cloud using hybrid cryptography
SECRY - Secure file storage on cloud using hybrid cryptography
ALIN BABU
Secure cloud storage
Secure cloud storage
ALIN BABU
Secry poster
Secry poster
ALIN BABU
IRJET- Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
E0952731
E0952731
IOSR Journals
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
SWAMI06
Providing Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri
Implementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
126689454 jv6
126689454 jv6
homeworkping8
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in Cloud Environment
SHREYASSRINATH94
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
El35782786
El35782786
IJERA Editor
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
E031102034039
E031102034039
theijes
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
H1803035056
H1803035056
IOSR Journals
Cloud Cryptography
Cloud Cryptography
ijtsrd
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
Más contenido relacionado
La actualidad más candente
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
SWAMI06
Providing Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri
Implementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
126689454 jv6
126689454 jv6
homeworkping8
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in Cloud Environment
SHREYASSRINATH94
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
El35782786
El35782786
IJERA Editor
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
1crore projects
E031102034039
E031102034039
theijes
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET Journal
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
H1803035056
H1803035056
IOSR Journals
La actualidad más candente
(20)
Improving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
Providing Secure Cloud for College Campus
Providing Secure Cloud for College Campus
Implementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
126689454 jv6
126689454 jv6
A Novel Approach for Data Security in Cloud Environment
A Novel Approach for Data Security in Cloud Environment
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
El35782786
El35782786
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
E031102034039
E031102034039
IRJET - A Secure Access Policies based on Data Deduplication System
IRJET - A Secure Access Policies based on Data Deduplication System
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
H1803035056
H1803035056
Similar a 262 265
Cloud Cryptography
Cloud Cryptography
ijtsrd
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
IJECEIAES
489 493
489 493
Editor IJARCET
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
Data security framework for cloud computing networks
Data security framework for cloud computing networks
IAEME Publication
Kp3419221926
Kp3419221926
IJERA Editor
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
IOSR Journals
Secure Access to Outsourced Databases
Secure Access to Outsourced Databases
IOSR Journals
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
J018145862
J018145862
IOSR Journals
Paper id 312201534
Paper id 312201534
IJRAT
Q01725110114
Q01725110114
IOSR Journals
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
iosrjce
R180203114117
R180203114117
IOSR Journals
Similar a 262 265
(20)
Cloud Cryptography
Cloud Cryptography
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
489 493
489 493
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
Data security framework for cloud computing networks
Data security framework for cloud computing networks
Kp3419221926
Kp3419221926
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Secure Access to Outsourced Databases
Secure Access to Outsourced Databases
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
J018145862
J018145862
Paper id 312201534
Paper id 312201534
Q01725110114
Q01725110114
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
R180203114117
R180203114117
Más de Editor IJARCET
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
Más de Editor IJARCET
(20)
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Último
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
panagenda
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Mydbops
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
Skynet Technologies
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
Último
(20)
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
262 265
1.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 A SURVEY ON CLOUD DATA SECURITY USING ENCRYPTIOIN TECHNIQUE C.BAGYALAKSHMI Research scholar, Department of Computer Science NGM College, Pollachi, Coimbatore, India – 642001 E-mail: bagyachithra@gmail.com DR.R.MANICKA CHEZIAN Associate Professor, Department of Computer Science NGM College, Pollachi, Coimbatore, India – 642001 ABSTRACT Cloud computing is an emerging computing paradigm in which resources of the computing infrastructures are provided as services of the internet. It allows consumers and business to use application without installation and access their personal files at any computer with internet access. It provides people the way to share distributed recourses and services that belong to different organizations or sites. Since it share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application, when consumers shares their data on cloud servers which is not within the same trusted domain data owners. To keep user data confidential against trusted servers, cryptographic methods are used by disclosing data decryption keys only to authorized users. This paper explores various data encryption technique such as Hybrid algorithm, DES algorithm, Identity based encryption. Key Terms: Cloud Computing, Encryption, Cryptography, Plaintext, Security. I INTRODUCTION Cloud computing is internet based computing where Protecting privacy in cloud providers is a virtual shared servers provide software, technical challenge. In cloud environment, this infrastructure, platform, devices and other resources challenge is complicated by distributed nature of and hosting to computers on a pay-as-you-use basis. clouds and lack of subscriber knowledge over where The world of computation has changed from the data is stored i.e. about data center and centralized to distributed systems and now we are accessibility of the users. In cloud computing have getting back to the virtual centralization. During the problem like security of data, file systems, backups, past few years, cloud computing grown from being a network traffic and host security. Cryptographic promising [1], Business idea to one of the fastest encryption is certainly the best practice. Encryption growing parts of the IT industry. IT organizations techniques should also be used for data in transit. In have express concern about security issues that exist addition authentication and integrity protection with the widespread implementation of cloud ensure that data only goes where the user wants it to computing. Cloud computing uses the internet as the go and its’ not modified in transit. User communication media. Cloud computing provides authentication is often the primary basis for access three services are SaaS (Software as a service), PaaS control. In the cloud environment authentication and (Platform as a service), IaaS (Infrastructure as a access control are more important than ever since the service) [6]. A cloud computing system must make a cloud and all of its data are accessible to anyone over copy of all its clients’ information and store it on the internet. other devices. These copies are enabling to the central server to access backup machines to retrieve the data. 262 All Rights Reserved © 2012 IJARCET
2.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 II RELATED WORKS The replacement remains the same throughout the message, so the cipher is classed as a type of The cloud security conations a different sort monoalphabetic substitution, as opposed to of taxonomy based on fifteen security domains and polyalphabetic substitution. processes that need to be followed in an overall cloud deployment. The security concerns can be B. DES ALGORITHM categorized as Traditional security, Availability and Third-party Data Control [5]. A user wants to login to In cloud computing have problem like a secured cloud system. To login into a system must security of data, file system, backups, network traffic, provide a correct combination of user name and and host security. A data security using encryption password and it should be matched with the decryption with DES algorithm whiles us transferring combination stored in the database whether in it over the network. The Data Encryption Standard plaintext from or in encrypted form. (DES) [4] is the name of the Federal Information Processing Standard (FIPS), which describes the Data III. ENCRYPTION TECHNIQUES Encryption Algorithm (DEA).DES Structure (Fig 1) has a 64-bit block size and uses a 56 bit key during A. HYBRID ALGORITHM execution. Its’ a symmetric cryptosystem, specifically a 16-around Feistel Cipher, when used for A secured login user provides login communication, both sender and receiver must know credentials and then to authenticate the user system the same secret key, which can be used to encrypt encrypts the provided password up to the number of and decrypt the message or to generate and verify a times defined to the system. Hybrid Algorithm [2] is Message Authentication Code (MAC).It can also be used to encrypt the message by which firstly the used for Single user encryption, such as to store files password will be encrypted by the Ceaser cipher then on a hard disk in encrypted form. the encrypted result will again be encrypted by using In Cipher Block Chaining mode of operation of DES, RSA substitution algorithm and finally the result will each block of ECB encrypted cipher text is XORed again be encrypted by the alphabetic substation with the next plain text block to be encrypted, thus method. Then password will be sent to the server making all the blocks dependent on all the previous with the plain text user name and if it matches only blocks this means that in order to find the plaintext of then the user get access to the system. For generation a particular block, you need to know the cipher text, of encryption key best encryption method by the key and the cipher text for the previous block. combing algorithms is used. The first block to be encrypted has no previous cipher In this way privacy to the secured cloud is provided text, so the plain text is XORed with 64-bit number by which transactions can take place. Because called the initialization vector. This mode of technique behind user name and password by operation is more secure then ECB (Electronic code combining three algorithms that are RSA, Monotonic book) because the extra XOR step adds one more and Ceaser cipher by which security is provided. layer to the encryption process.DES exhibits the Firstly Password is encrypted by Ceaser cipher then complementation property, namely that the encrypted result is again be encrypted by using RSA algorithm and finally the result is again be encrypted by mono alphabetic substation method. Developers can benefit from this technique in order Where is the bitwise complement of to provide security. The encryption can also be represented Denotes encryption with key using modular arithmetic by first transforming the And denote plaintext and cipher text blocks letters into numbers, according to the scheme, A = 0, respectively. B = 1,..., Z = 25.Encryption of a letter by a shift n can be described mathematically as, The complementation property means that the work for a brute force attack could be reduced by a factor of 2 (or a single bit) under a chosen-plaintext assumption. By definition, this property also applies also to TDES cipher. Decryption is performed similarly, 263 All Rights Reserved © 2012 IJARCET
3.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 C. INDENTITY BASED ENCRYPTION Identity based Encryption (IBE) is frequent for the entities to communicate manually. To achieve the security in the communication, it is important to impose an encryption and signature schemes.IBE [3] is a form of public key cryptography in which a third party server uses a simple identifier, such as an e- mail address, to generate a public key cryptography that can be used for encrypting and decrypting electronic messages. Compared with typical public key cryptography, this greatly reduces the complexity of the encryption process for both users and administrators. An added advantage is that a message recipient doesn’t need advance preparation or specified software to read the communication. IBE depends upon the third-party IBE server that generates private keys. The only information this server stores permanently is a secret key a large random number that is exclusive to the security domain. The server uses this key to create a common set of public key parameters that are given to each user who installs the IBE software, and recipient’s private keys are required. When sender creates an encrypted message, the IBE software on his system uses three parameters to generate the public key for the message a string value, the current week number and the parameter’s identity. A user who receives an IBE encrypted e- mail message but has not used the process before can request upon authentication a private key that allows him to decrypt all e-mails encrypted using his e-mail address as the public key. An identity based signature scheme is deterministic if the signature on a message by the same user is always the same. The private key generator provides the security parameter as the input to this algorithm, generates the systems parameters and the master private key. This algorithm on input a Fig1. Structure of DES signature on message m by the user with identity ID, parameters, checks whether signature is valid on DES (Fig 1) also has four so-called weak keys. message m by ID. Encryption (E) and decryption (D) under a weak key have the same effect (see involution): IV. CONCLUSION & FUTURE SCOPE or equivalently, Among the many IT giants driven by trends in cloud computing has not doubtful. It gives almost There are also six pairs of semi-weak keys. everyone has brought good news. Provision of Encryption with one of the pair of semiweak security to the users data on the cloud will defiantly keys, operates identically to decryption with the empowers the data owner to outsource to the cloud. other, : Data security has become the most important issue of cloud computing security. The main contribution of or equivalently, this paper is the new view of data security solution with encryption, which is important and can be used as reference for designing the complete security solution. 264 All Rights Reserved © 2012 IJARCET
4.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 In future work, that data storage security in 3. Neha Jain and Gurpreet Kaur cloud computing, an area full of challenges and of “Implementing DES Algorithm in Cloud for paramount importance, are still in its infancy now, Data Security” VSRD International Journal and many research problems are yet to be identified of Computer Science & Information is to enhance the more security features by using Technology- vol 2(4), ISSN: 2231-2471, other enhanced techniques of data security through 2012. cryptosystems and other technique. A best technique 4. D.H. Patil “Data Security over for securing cloud by mixture of algorithms, in this Cloud“International Journal of Computer analysis fully delivers on the promise of merging the Applications 2012. best aspects of dynamic and static testing into a 5. G. Jai Arul Jose “Implementation of Data tightly interwoven approach for rapidly resolving Security in cloud Computing” International security vulnerabilities in software. Journal of P2P Network Trends and Technology – vol 1, Issue1- 2011. 6. Sriram Ramanujam “Data Security in Cloud V. REFERENCES Computing” J.Comp. & Math. Sci – vol 2(1),2011. 1. Sunia Rani, Ambrish Gangal “Cloud 7. M.Rashid and F. Saeed, “Integfrating Security with Encryption using Hybrid Classical Encryption with Modern Algorithm” International Journal of Technique” Computer Science and Information International Journal of Computer Science Technologies, vol. 3(3), ISSN: 0975-9646, and Network Security, Vol.10 No.5 2010. 2012. 8. http://en.kipedia.org/wiki/cloud_computing 2. Simarjeet Kaur “Cryptography and 9. http://www.cs./~crypto/historical/caesar.htm Encryption in Cloud Computing” VSRD l International Journal of Computer Science 10. http://crypto.stanford.edu/ibe/ & Information Technology- vol 2(3), ISSN: 11. http://eprint.iacr.org/2010/010.pdf 2231-2471, 2012. 12. http://en.wikipedia.org/wiki/Block_cipher_ modes_of_operation 265 All Rights Reserved © 2012 IJARCET
Descargar ahora