Data security and storage in cloud using hybrid algorithms

  • Authors

    • L Archana
    • K P. K. Devan
    • P Harikumar
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.12797
  • Advanced Encryption Standard, Data Encryption Standard, Fully Homomorphic Encryption.
  • Cloud Computing has already grabbed its roots in many industries. It has become a fascinating choice for small budget organizations, as On-demand resources are available on pay as you use basis. However, security of data being stored at cloud servers is still a big question for organizations in today’s digital era where information is money. Large organizations are reluctant to switch to cloud services since they have threat of their data being manipulated. Cloud service provider’s claim of providing robust security mechanism being maintained by third party, but still there are many reported incidents of security breach in cloud environment in past few years. Thus, there is need for ro-bust security mechanism to be adopted by cloud service providers in order for excelling cloud computing. Since there are n number of data’s in cloud, Storage of those data are to be placed with high rank of Significance. In Existing system, no efficient hybrid algorithms are used there by security and storage is compromised to significant ratio. We propose AES and Fully Homomorphic algorithm to encrypt the data, thereby file size get is compressed thereby increasing Data security and stack pile.

     

     

  • References

    1. [1] Alexandr N. Gerasimov, Anna V. Epishkina, Konstantin G. Kogos,â€Research of Homomorphic Encryption Algorithms over Integersâ€, 978-1-5090-4865-6/17/$31.00 IEEE, (2017).

      [2] Dr. A. M. Gonosai and L.M. Raval, “Evaluation of Common Encryption Algorithm and Scope of Advanced Algorithm for Simulated Wireless Networkâ€, International Journal of Computer Trends and Technology, Vol 11(1), pp. 7-12, May 2014.

      [3] J.Viega,â€Cloud Computing and the Common Manâ€, Journal Computer Vol 42(8), pp. 106-108, August 2009.

      [4] K.Yang and J.Xiaohva, “Security for Cloud Storage Systemsâ€, Springer Brief in Computer Science, 2014.

      [5] L.Archana and Mr.K.P.K.Devan,â€A Survey on Various Cryptographic Algorithms†International Journal of Recent Engineering Research and Development (IJRERD) ISSN: 2455-8761, Volume 02 – Issue 12,| December 2017, PP. 01-04.

      [6] L. Arockiam, S. Monikandan, “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithmâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol 2,Issue 8,August 2013.

      [7] P.Mell, Grance,†The NIST definition of Cloud Computingâ€, NIST Special Publication, pp. 800-145, Sep 2011.

      [8] P.Rewagad and Y.Pawar,†Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computingâ€, 2013 International Conference on Communication Systems and Network Technologies, 2013.

      [9] Peng Zhang , Xiaoqiang Sun, Ting Wang, Sizhu Gu, Jianping Yu, Weixin Xie, “An Accelerated Fully Homomorphic Encryption Scheme Over The Integersâ€, Proceedings of CCIS2016, pp. 419-423.

      [10] Prerna Mahajan,Abhishek Sachdena,â€A study of Encryption Algorithms AES,DES and RSA for Securityâ€,Global Journal of Computer Science and Technology Network web and Security,vol.13,Issue 15,Vol 1,2013.

      [11] R.A.Popa, C.M.S.Redfield, N.Zeldovich al,H.Balakrishnan, “CryptDB: Protecting Confidentiality with Encrypted Query Processingâ€, pp. 85-100, 2012.

      [12] T .Chou, “Security Threats on Cloud Computing Vulnerabilitiesâ€, International Journal of Computer Science and Information Technology, Vol 5(3), pp .79-88, 2013.

      [13] Y. Pawar, P. Rewagad and N. Lodha, â€Comparative Analysis of PAVD Security System with Security Mechanism of Differenr Cloud Storage Servicesâ€,2014 Fourth International Conference on Communication Systems and Network Technologies, 2014.

  • Downloads

  • How to Cite

    Archana, L., P. K. Devan, K., & Harikumar, P. (2018). Data security and storage in cloud using hybrid algorithms. International Journal of Engineering & Technology, 7(2.20), 150-152. https://doi.org/10.14419/ijet.v7i2.20.12797