Data security and storage in cloud using hybrid algorithms

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud Computing has already grabbed its roots in many industries. It has become a fascinating choice for small budget organizations, as On-demand resources are available on pay as you use basis. However, security of data being stored at cloud servers is still a big question for organizations in today’s digital era where information is money. Large organizations are reluctant to switch to cloud services since they have threat of their data being manipulated. Cloud service provider’s claim of providing robust security mechanism being maintained by third party, but still there are many reported incidents of security breach in cloud environment in past few years. Thus, there is need for ro-bust security mechanism to be adopted by cloud service providers in order for excelling cloud computing. Since there are n number of data’s in cloud, Storage of those data are to be placed with high rank of Significance. In Existing system, no efficient hybrid algorithms are used there by security and storage is compromised to significant ratio. We propose AES and Fully Homomorphic algorithm to encrypt the data, thereby file size get is compressed thereby increasing Data security and stack pile.



  • Keywords

    Advanced Encryption Standard; Data Encryption Standard; Fully Homomorphic Encryption.

  • References

      [1] Alexandr N. Gerasimov, Anna V. Epishkina, Konstantin G. Kogos,”Research of Homomorphic Encryption Algorithms over Integers”, 978-1-5090-4865-6/17/$31.00 IEEE, (2017).

      [2] Dr. A. M. Gonosai and L.M. Raval, “Evaluation of Common Encryption Algorithm and Scope of Advanced Algorithm for Simulated Wireless Network”, International Journal of Computer Trends and Technology, Vol 11(1), pp. 7-12, May 2014.

      [3] J.Viega,”Cloud Computing and the Common Man”, Journal Computer Vol 42(8), pp. 106-108, August 2009.

      [4] K.Yang and J.Xiaohva, “Security for Cloud Storage Systems”, Springer Brief in Computer Science, 2014.

      [5] L.Archana and Mr.K.P.K.Devan,”A Survey on Various Cryptographic Algorithms” International Journal of Recent Engineering Research and Development (IJRERD) ISSN: 2455-8761, Volume 02 – Issue 12,| December 2017, PP. 01-04.

      [6] L. Arockiam, S. Monikandan, “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, Vol 2,Issue 8,August 2013.

      [7] P.Mell, Grance,” The NIST definition of Cloud Computing”, NIST Special Publication, pp. 800-145, Sep 2011.

      [8] P.Rewagad and Y.Pawar,” Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, 2013 International Conference on Communication Systems and Network Technologies, 2013.

      [9] Peng Zhang , Xiaoqiang Sun, Ting Wang, Sizhu Gu, Jianping Yu, Weixin Xie, “An Accelerated Fully Homomorphic Encryption Scheme Over The Integers”, Proceedings of CCIS2016, pp. 419-423.

      [10] Prerna Mahajan,Abhishek Sachdena,”A study of Encryption Algorithms AES,DES and RSA for Security”,Global Journal of Computer Science and Technology Network web and Security,vol.13,Issue 15,Vol 1,2013.

      [11] R.A.Popa, C.M.S.Redfield, N.Zeldovich al,H.Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query Processing”, pp. 85-100, 2012.

      [12] T .Chou, “Security Threats on Cloud Computing Vulnerabilities”, International Journal of Computer Science and Information Technology, Vol 5(3), pp .79-88, 2013.

      [13] Y. Pawar, P. Rewagad and N. Lodha, ”Comparative Analysis of PAVD Security System with Security Mechanism of Differenr Cloud Storage Services”,2014 Fourth International Conference on Communication Systems and Network Technologies, 2014.




Article ID: 12797
DOI: 10.14419/ijet.v7i2.20.12797

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.