Analysis and assessment of various cryptographic techniques based on a variety of features

  • Authors

    • R Rajan
    • Dr G. Murugaboopathi
    • Dr C.Parthasarathy
    2018-03-01
    https://doi.org/10.14419/ijet.v7i1.9.9730
  • Cloud Computing, Security Issues, Cryptography System, Security Solution.
  • Abstract

    Cloud computing process is an IT service invented for providing efficient network, software, hardware, storage, software systems and resource services. Cloud computing delivers service to the customers through a network. The IT and the management services involved in it is taken care by third parties that owns the physical infrastructure involved in the service. Cloud service provides us the ease to access information at any place, any time with minimum cost involved and high reliability, scalability and resilience. Because of these advantages many organizations are converting themselves to cloud. With growing demand it is necessary to consider the confidentiality of information and also secure it from unauthorized users, denial of services, modification, etc. Securing the storage and computation process in cloud is essential to avoid the above threats. Security protocol in cloud is enhanced through cryptographic algorithms to eliminate the various security threats in our work.

  • References

    1. [1] J. Feng, Y. Chen, D. Summerville,Z. Su and W. Ku“Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol†on 2011 in Consumer Communications and Networking Conference (CCNC).

      [2] Lori M. Kaufman, “Data security in the world of cloud_ computingâ€, July. Aug. 2009. IEEE Security and Privacy Journal, Vol. 7.

      [3] Giuseppe Ateniese, Kevin Fu, Susan Hohenberger and Matthew Greenon February 2005 “Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storageâ€, In Proceedings of the 12th Annual Network and Distributed System Security Symposium

      [4] Sunia Rani, AmbrishGangal “Cloud Security with Encryption using Hybrid Algorithm†International Journal of Computer Science and Information Technologies, vol. 3(3), ISSN: 0975-9646, 2012.

      [5] G. Clarke, Microsoft's Azure Cloud Suffers First Crash, The Register, March 16, 2009, [online] http://www.theregister.co.uk/.

      [6] Hassan Takabi , James B.D. Joshi, Gail Joon Ahn, â€Cloud Computing Security and Privacy Challenges in Cloud Computing Environments ", COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES,1540-7993/10/$26.00 © 2010 IEEE.

      [7] Australian government department of defense, "Cloud Computing Security Considerations", CYBER SECURITY OPERATIONS CENTRE APRIL 2011, UPDATED SEPTEMBER 2012.

      [8] Akansha Deshmukh, Harneet Kaur Janda, SayaleeBhusari, "Security on Cloud Using Cryptography", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 3, March 2015 ISSN: 2277 128X Available online at: www.ijarcsse.com

      [9] James Mark Kelly,Columbus state University CPSC 6128 Spring 2010- Cloud computing and cryptography

      [10] Neha Jain and Gurpreet Kaur „Implementing DES lgorithm in Cloud for Data Security†VSRD International Journal of CS & IT Vol. 2 Issue 4, 2012, pp. 316-321.

      [11] Rashmi Nigoti1, Manoj Jhuria2 Dr.Shailendra Singh3, " A Survey of Cryptographic Algorithms for Cloud Computing ", International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) Available online at: www.iasir.net.

      [12] G. Murugaboopathi, C.Chandravathy, P. Vinoth Kumar, " Study on Cloud Computing and Security Approaches", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-1, March 2013.

      [13] Seny Kamara, Kristin Lauter, "Cryptographic Cloud Storage", Financial Cryptography and Data Security Volume 6054, 2010, pp 136-149.https://doi.org/10.1007/978-3-642-14992-4_13.

      [14] Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Jesus MolinaRyusukeMasuoka“Controlling Data in the Cloud Outsourcing Computation without Outsourcing Controlâ€, In Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW ‟09, pages 85–90.

      [15] SADIKIN RIFKI, YOUNGHO PARK, SANGJAE MOON, “A Fully Secure Cipher text-Policy Attribute-Based Encryption with A Tree-Based Access Structureâ€.

      [16] Niranjanamurthy M , Charan Raj U , Raghavendra E , Sowmya R , Suhas Jadhav J, "Comparative Study on Cloud Computing (CC) and Mobile Cloud Computing (MCC)", International Journal of Computer Science and Mobile Computing, Vol.3 Issue.10, October- 2014, pg. 280-290.

  • Downloads

  • How to Cite

    Rajan, R., G. Murugaboopathi, D., & C.Parthasarathy, D. (2018). Analysis and assessment of various cryptographic techniques based on a variety of features. International Journal of Engineering & Technology, 7(1.9), 28-33. https://doi.org/10.14419/ijet.v7i1.9.9730

    Received date: 2018-02-26

    Accepted date: 2018-02-26

    Published date: 2018-03-01