scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Security Algorithms in Cloud Computing

15 Nov 2017-International Journal of Computer Applications (Foundation of Computer Science (FCS), NY, USA)-Vol. 178, Iss: 5, pp 33-37
TL;DR: Diverse calculations will be examined for security of information in distributed computing for cloud computing services.
Abstract: Cloud computing provides services over web with powerful resizable resources. Cloud computing facilities give advantages to the end user in terms of cost and ease of use. Cloud computing services require security during transfer of important data and censorious applications to shared and public cloud environments. To store information on cloud, client needs to exchange their information to the outsider who will deal with and store the information. So it is imperative for any association to secure that information. Information is said to be secured if the classification, accessibility, security is available. Numerous calculations have been use to secure the information. In this paper diverse calculations will examine for security of information in distributed computing.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: This study combines homographic encryption and blowfish encryption to enhance cloud security and proposes a hybrid algorithm to enhance security of cloud data using encryption algorithm.
Abstract: Cloud computing is a term which is employed to explain different concepts of computing that includes several PCs linked through a real time network of communication such as internet. Cloud computing is a developing paradigm which has in the recent times attracted lot of researchers because of its capability to decrease the costs related with computing. Due to the rapid growth of cloud computing techniques the rapid raise of services of cloud became outstanding. In today’s world data security is a challenging problem. The essential issue related with cloud computing is the security of cloud and the proper cloud implementation over the network. In cloud the models of security namely confidentiality, authentication, accessibility, data recovery and data integrity. It includes services of cloud, model of deployment, security problems and barriers in cloud computing. Nowadays, enhancing security of data in cloud has become a major concern and the solution for this is to apply appropriate encryption techniques while storing the data in the cloud. This study proposes a hybrid algorithm to enhance security of cloud data using encryption algorithm. The main purpose of using encryption algorithms is to secure or store huge amount of information in cloud. This study combines homographic encryption and blowfish encryption to enhance cloud security. It can be concluded that if the security issues are resolved then the future will be the solutions for cloud storage for small as well as large firms.

58 citations

Journal ArticleDOI
TL;DR: An encryption-based proposed system is presented to secure system security during data transfer in order to prevent data theft by unauthorized person and Systematic Literature Review is proposed to generate suggestions and opportunities in AES cloud computing.
Abstract: Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.

26 citations


Cites background from "Security Algorithms in Cloud Comput..."

  • ...Due to high demand on cloud usage [5], every cloud service provider is encouraged to provide data security to its user [6], [7]....

    [...]

Proceedings ArticleDOI
28 Sep 2020
TL;DR: The proposed system, Advanced Encryption Standard (AES) algorithm, will anticipate every irresponsible person to hack cloud system and will encrypt and decrypt information on data transmission and storage.
Abstract: Cloud computing can be described as a network technology among users to share data, resources and even services. Because million users have the same rights to use network for data transmission, data is vulnerable to be hacked by irresponsible person. The concentration of security on current system can only be found on data storage on cloud, meanwhile less concentration is found on data transmission. As we determine security can be potential issue, the proposed system (encryption) will secure data transfer. The proposed system, Advanced Encryption Standard (AES) algorithm, will anticipate every irresponsible person to hack cloud system. The proposed algorithm will encrypt and decrypt information on data transmission and storage. To improve published research on security of data transmission by using AES algorithm is the paper purpose. In order to do that, the research will use several mathematical methods. There are Markov Chain and Forecasting methods. Research results show that there are possibilities to research on AES algorithm for security of data transmission in the near future by 29% in 2023.

13 citations


Cites background from "Security Algorithms in Cloud Comput..."

  • ...The algorithm has key (symmetric cryptographic) to do encryption and decryption [1], [2] [6]....

    [...]

  • ...Gaining better data security [5], a proposed model is needed to avoid unauthorized person [6]....

    [...]

  • ...So, cloud service provider provides security for user’s data [5], [6]....

    [...]

DOI
20 Apr 2018
TL;DR: An innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds is introduced.
Abstract: Authentication and cryptography have been used to address security issues on various online services. However, researchers discovered that even the most commonly used multi-factor out-of-band authentication mechanism was vulnerable to attacks and traditional crypto-algorithms were characterized to have some drawbacks making it crucial to choose desirable algorithms for a particular purpose. This study introduces an innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds. Experimentation results on 128-bit input text revealed significant performance improvements with utmost 5.91 % in terms of avalanche effect, 38.97 % for integrity, and 41.02 % in terms of execution time. Results also showed that the modification introduced extra security layer, thus, displaying higher complexity and stronger diffusion at faster execution time making it more difficult and complex for an unauthorized individual to decipher the information and desirable to be used for applications with multiple users respectively. This is a good contribution to the continuous developments in the field of information security particularly in cryptography and towards providing a secure OTP for multifactor out-of-band authentication.

11 citations


Cites background from "Security Algorithms in Cloud Comput..."

  • ...However, since symmetric algorithms like Blowfish requires the same key for encryption and decryption, secrecy and size of the secret key are the only means of defense [2][20][22]....

    [...]

  • ...Several cryptographic algorithms or cryptoalgorithms have been developed, categorized as either symmetric or asymmetric [2][14][17][18][19], of which symmetric algorithms show good performance with respect to speed [20][16] and security through strong key size [16]....

    [...]

DOI
20 Apr 2019
TL;DR: This research paper proposes a simple and highly secure encryption decryption (SHSED) algorithm that can be used for cloud computing-based applications and achieves the Shannon’s concept of diffusion and confusion by the involvement of logical operations.
Abstract: In the course of the past 30 years, data has become pivotal to all aspects of human life. Data generated, captured, and replicated are increasing in size and expanding applications. The proliferation of fast wireless networks has encouraged data storage within the cloud. So, protecting data from attackers has become urgent to maintain its security and confidentiality, need for security and privacy technologies, systems, and processes to address it. This research paper proposes a simple and highly secure encryption decryption (SHSED) algorithm that can be used for cloud computing-based applications. It achieves the Shannon’s concept of diffusion and confusion by the involvement of logical operations, such as XORing, addition, and subtraction in addition to byte shifting. It is also characterized by the flexibility in the secret key length and the number of rounds. Experimental results have demonstrated powerful security level and a clear improvement in the encryption execution time measurements and security strength as compared with cryptosystems widely used in cloud computing.

10 citations

References
More filters
Book ChapterDOI
TL;DR: This chapter describes various service and deployment models of cloud computing and identifies major challenges, including three critical challenges: regulatory, security and privacy issues in cloud computing.
Abstract: Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.

185 citations

Proceedings ArticleDOI
06 Apr 2013
TL;DR: This paper has proposed to make use of digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption Standard encryption algorithm to protect confidentiality of data stored in cloud.
Abstract: Cloud computing is the apt technology for the decade It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment Since cloud computing is rest on internet, security issues like privacy, data security, confidentiality, and authentication is encountered In order to get rid of the same, a variety of encryption algorithms and mechanisms are used Many researchers choose the best they found and use it in different combination to provide security to the data in cloud On the similar terms, we have chosen to make use of a combination of authentication technique and key exchange algorithm blended with an encryption algorithm This combination is referred to as "Three way mechanism" because it ensures all the three protection scheme of authentication, data security and verification, at the same time In this paper, we have proposed to make use of digital signature and Diffie Hellman key exchange blended with (AES) Advanced Encryption Standard encryption algorithm to protect confidentiality of data stored in cloud Even if the key in transmission is hacked, the facility of Diffie Hellman key exchange render it useless, since key in transit is of no use without user's private key, which is confined only to the legitimate user This proposed architecture of three way mechanism makes it tough for hackers to crack the security system, thereby protecting data stored in cloud

141 citations

Proceedings ArticleDOI
12 Nov 2012
TL;DR: A new cloud computing environment where a trusted cloud environment which is controlled by both the client and the cloud environment admin is proposed, which provides a two way security protocol which helps both the cloud and the normal user.
Abstract: The increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. This lead to the demand of cloud computing. But there are some security concerns when we handle and share data in the cloud computing environment. In this paper we propose a new cloud computing environment where we approach a trusted cloud environment which is controlled by both the client and the cloud environment admin. Our approach is mainly divided into two parts. First part is controlled by the normal user which gets permission by the cloud environment for performing operation and for loading data. Second part shows a secure trusted computing for the cloud, if the admin of the cloud want to read and update the data then it take permission from the client environment. This provides a way to hide the data and normal user and can protect their data from the cloud provider. This provides a two way security protocol which helps both the cloud and the normal user. For the above concept we apply RSA and MD 5 algorithm. When the cloud user upload the data in the cloud environment, the data is uploaded in encrypted form using RSA algorithm and the cloud admin can decrypt using their own private key. For updating the data in the cloud environment admin request the user for a secure key. Cloud user sends a secure key with a message digest tag for updating data. If any outsiders perform a change in the key, the tag bit is also changed indicating the key is not secure and correct.

96 citations

Proceedings ArticleDOI
11 Dec 2014
TL;DR: Hybrid (RSA & AES) encryption algorithm to safeguard data security in Cloud being the most important factor in cloud computing has to be dealt with great precautions.
Abstract: This paper presents Hybrid (RSA & AES) encryption algorithm to safeguard data security in Cloud. Security being the most important factor in cloud computing has to be dealt with great precautions. This paper mainly focuses on the following key tasks: 1. Secure Upload of data on cloud such that even the administrator is unaware of the contents. 2. Secure Download of data in such a way that the integrity of data is maintained. 3. Proper usage and sharing of the public, private and secret keys involved for encryption and decryption. The use of a single key for both encryption and decryption is very prone to malicious attacks. But in hybrid algorithm, this problem is solved by the use of three separate keys each for encryption as well as decryption. Out of the three keys one is the public key, which is made available to all, the second one is the private key which lies only with the user. In this way, both the secure upload as well as secure download of the data is facilitated using the two respective keys. Also, the key generation technique used in this paper is unique in its own way. This has helped in avoiding any chances of repeated or redundant key.

67 citations

Proceedings ArticleDOI
23 Mar 2016
TL;DR: In this proposed system AES, blowfish, RC6 and BRA algorithms are used to provide block wise security to data and LSB steganography technique is introduced for key information security.
Abstract: Now a day's cloud computing is used in many areas like industry, military colleges etc to storing huge amount of data. We can retrieve data from cloud on request of user. To store data on cloud we have to face many issues. To provide the solution to these issues there are n number of ways. Cryptography and steganography techniques are more popular now a day's for data security. Use of a single algorithm is not effective for high level security to data in cloud computing. In this paper we have introduced new security mechanism using symmetric key cryptography algorithm and steganography. In this proposed system AES, blowfish, RC6 and BRA algorithms are used to provide block wise security to data. All algorithm key size is 128 bit. LSB steganography technique is introduced for key information security. Key information contains which part of file is encrypted using by which algorithm and key. File is splited into eight parts. Each and every part of file is encrypted using different algorithm. All parts of file are encrypted simultaneously with the help of multithreading technique. Data encryption Keys are inserted into cover image using LSB technique. Stego image is send to valid receiver using email. For file decryption purpose reverse process of encryption is applied.

51 citations


"Security Algorithms in Cloud Comput..." refers background in this paper

  • ...It implies that customer's information and ciphering should be held esoteric from equally cloud service and different punter[13]....

    [...]