Author : Mr. Girish Kumar D 1
Date of Publication :30th November 2017
Abstract: Cloud Computing (CC)is the delivery of on-demand shared computing resources to computer or other devices, CC has changed the way we think about the way we perform our day to day operation and now a day’s almost all applications are using CC to meet their requirements without actually licensing or purchasing the software and also the infrastructure. There is a lot of chance to misuse of data by the third party (Cloud Service Provider) and the main security factors which affect the performance of the system are confidentiality, availability and integrity of data. Many encryption algorithms have been developed and implemented to provide security for the data which is stored in the cloud, but no algorithm provides 100% security for the data which is stored in the cloud. This paper gives a study of different encryption techniques used in CC that is used to provide security for the data stored in the cloud.
Reference :
-
- Suriya kala.L, Dr. R. Thangaraj “A Study on different Image Encryption Algorithms” ,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 1204-1206
- Swadeep Singh, Anupriya Garg, Anshul Sachdeva, “Comparision of Cryptograpic Algorithms ECC and RSA”, International Journal of Computer Science and Communication Engineering (IJCSC), Special issue on “Recent Advances in Engineering & Technology” NCRAET-2013, ISSN 2319-7080.
- Sahan Ahmad, Kazi Md. Rokibul Alam, Habibur Rahman, and Shinsuke Tamura, “A Comparison between Symmetric and Asymmetric Key Encryption Algorithm based Decryption Mixnets”, National Conference on Networkinh Systems and Security (NSysS), 2015, 978-1- 4799-8162-7/2015 IEEE
- P. Princy, “A Comparison of Symmetric Key Algorithms Des, Aes, Blowfish, Rc4, Rc6: A Survey”, International Journal of Computer Science & Engineering Technology (IJCSET) ISSN: 2229-3345 Vol. 6 No. 05 May 2015
- Tingyuan Nie and Teng Zhang, “A Study of DES and Blowfish Encryption Algorithm”, IEEE Region 10 Conference (TECHNO) IEEE, 2009.
- R.L. Rivest.”The RC5 encryption algorithm”. In B. Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 86-96, 1995. Springer Verlag
- Neeta Wadhwa, Syed Zeeshan Hussain & S. A. M Rizvi, International Journal of Computer Science and Engineering (IJCSE) ISSN 2278-9960 Vol. 2, Issue 3, July 2013, 89-94
- V. Mnssvkr Gupta, K.V.S. Murthy, A. Yesubabu, R. Shiva A Shankar, “Recent performance evaluation among various AES algorithm- MARS, RC6, RIJNDAEL, SERPENT, TWOFISH”, International Journal of Science and Advanced Technology(IJSAT), 2012.
- Perlman, R. and Kaufman, C. “Key Exchange in IPSec: Analysis of IKE”, IEEE Internet Computing, Nov/Dec 2000.
- M. S. Hwang, C. C. Lee, and S. F. Tzeng, “A New Knapsack Public- Key Cryptosystem Based on Permutation Combination Algorithm”, International Journal of Applied Mathematics and Computer Sciences (IJAMCS) vol. 5; 1, pp. 33-38, Winter 2009.
- Pooja Natu, Prof. Shikha Pachouly “A Comparative Analysis of Provable Data Possession Schemes in Cloud”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (6), 2014, 7927-7931
- Xun Yi, Russell Paulet, Elisa Bertino 2014”Homomorphic Encryption and Applications”, SpringerBriefs in Computer Science, DOI 10.1007/978- 3-319-12229-8__2
- Payal V. Parmar, Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, Rutvij H. Jhaveri, “Survey of Various Homomorphic Encryption algorithms and Schemes”, International Journal of Computer Applications (0975 – 8887) Volume 91 – No.8, April 2014
- Prashanth Kumar Arya, Dr Mahendra Sing Aswal, Dr Vinod Kumar, “Comparative Study of Asymmetric Key Cryptographic Algorithms” International Journal of Computer Science & Communication Networks,Vol 5(1),17-21
- S. Nithya , Dr. E. George Dharma Prakash Raj, “ Survey on Asymmetric Key Cryptography Algorithms”, Journal of Advanced Computing and Communication Technologies(JACCT) (ISSN: 2347 - 2804) Volume No. 2 Issue No. 1, February 2014
- Yogesh Kumar, Rajiv Munjal, Harsh Sharma “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures” , IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011ISSN (Online): 2231-5268