DOI QR코드

DOI QR Code

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam (Bursar & Director (MCA)) ;
  • S. Edel Josephine Rajakumari (Department of Computer Science Jamal Mohamed College (Autonomous), Affiliated to Bharathidasan University)
  • Received : 2023.05.05
  • Published : 2023.05.30

Abstract

Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

Keywords

References

  1. Peter Mell and Timothy Grance: The NIST Definition of Cloud Computing. In: National Institute of Standards and Technology, U.S. Department of Commerce, Special Publication, 14 (2011)
  2. D.I.George Amalarethinam, S.Edel Josephine Rajakumari: A Survey on Security Challenges in Cloud Computing. In: Journal of Physical Sciences, ISSN. 2350-0352 (p), vol. 24, pp. 133 - 141 (2019)
  3. Payal V. Parmar, Shraddha B. Padhar, Shafika N. Patel, Niyatee I. Bhatt, Rutvij H. Jhaveri: Survey of Various Homomorphic Encryption algorithms and Schemes. In: International Journal of Computer Applications, ISSN. 0975 - 8887, vol. 91 (8) (2014)
  4. Vishwanath S. Mahalle, Aniket Shahade: Enhancing the Data Security in Cloud by implementing Hybrid (RSA & AES) Encryption Algorithm. In: IEEE (2014)
  5. D.I. George Amalarethinam. J.Sai Geetha, K.Mani: Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting. In: International Journal of Computer Applications, ISSN. 0975 - 8887, vol. 96 (14) (2014)
  6. Nasrin Khanezaei, Zurina Mohd Hanapi: A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services. In: IEEE (2014)
  7. Er. Ashima Pansotra, Er. Simar Preet Singh: Cloud Security Algorithms. In: International Journal of Security and Its Applications, vol.9 (10), pp.353-360 (2015) https://doi.org/10.14257/ijsia.2015.9.10.32
  8. Srinivasan Nagaraj, Dr.G.S.V.P.Raju, V.Srinadth: Data Encryption and Authentication Using Public Key Approach. In: Elsevier Procedia Computer Science, 48, pp. 126 - 132 (2015) https://doi.org/10.1016/j.procs.2015.04.161
  9. D. I. George Amalarethinam, J. Sai Geetha: A Survey on Secured Communication with High Speed and Public Key Cryptography. In: International Journal of Scientific and Engineering Research (IJSER), vol. 7 (4), (2016)
  10. Bhandari A., Gupta A., & Das D.: Secure algorithm for cloud computing and its applications. In: IEEE (2016)
  11. Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour: An Enhanced Approach for Data Sharing Security in Cloud Computing. In: International Journal of Cloud Computing, vol. 5 (3), (2016)
  12. Priyadarshini Patil, Prashant Narayankar, Narayan D G, Meena S M: A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. In: Elsevier Procedia Computer Science 78, pp. 617 - 624 (2016) https://doi.org/10.1016/j.procs.2016.02.108
  13. Akashdeep Bhardwaj, GVB Subrahmanyam, Vinay Avasthi, Hanumat Sastry: Security Algorithms for Cloud Computing. In: Elsevier Procedia Computer Science 85, pp. 535 - 542 (2016) https://doi.org/10.1016/j.procs.2016.05.215
  14. Manish M Potey, Dr C A Dhote, Deepak H Sharma: Homomorphic Encryption for Security of Cloud Data. In: Elsevier Procedia Computer Science 79, pp. 175 - 181 (2016) https://doi.org/10.1016/j.procs.2016.03.023
  15. Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki El Belrhiti El Alaoui: A Secure Cloud Computing Architecture Using Homomorphic Encryption. In: International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7 (2) (2016)
  16. Ihsan Jabbar, Saad Najim: Using Fully Homomorphic Encryption to Secure Cloud Computing. In: Internet of Things and Cloud Computing, ISSN. 2376-7715 (p), ISSN. 2376-7731 (o) vol. 4 (2), pp. 13 - 18 (2016) https://doi.org/10.11648/j.iotcc.20160402.12
  17. Priya G, Lawanya Shri M, Benjula Anbu Malar M.B., Santhi K, Deepa M: Security Algorithms in Cloud Computing: A Review. In: International Journal of Pure and Applied Mathematics, vol.117 (7), pp. 85 - 92 (2017)
  18. Nasarul Islam K.V, Mohamed Riyas.K.V.: Analysis of Various Encryption Algorithms in Cloud Computing. In: International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 6 (7), pp. 90-97 (2017)
  19. Vikas K.Soman, Natarajan V: An Enhanced hybrid Data Security Algorithm for Cloud. In: IEEE (2017)
  20. S.Rajendirakumar, Dr.A.Marimuthu: Cryptographic Algorithms used in Cloud Computing - An Analysis and Comparison. In: International Journal for Research in Applied Science & Engineering Technology (IJRASET), ISSN. 2321-9653, vol. 6 (1), pp. 2718 - 2728 (2018)
  21. D.I. George Amalarethinam, H.M. Leena: A Comparative Study on various Symmetric Key Algorithms for enhancing Data Security in Cloud Environment. In: International Journal of Pure and Applied Mathematics, ISSN. 1311-8080 (P), pp. 85-94 (2018)
  22. Sarah Shihab Hamad, Ali Makki Sagheer: Design of Fully Homomorphic Encryption by Prime Modular Operation. In: Telfor Journal, Vol. 10 (2) (2018)
  23. K.V.Pradeep, V.Vijayakumar and V.Subramaniyaswamy: An Efficient Framework for sharing a file in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment. In: Journal of Computer Networks and Communications, pp. 1 - 8 (2019)
  24. Naveen N, K.Thippeswamy: Security and Privacy Challenges Using Multi-Layer Encryption Approaches In Cloud Computing Environments. In: International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN. 2278-3075, vol. 8 (8) (2019)
  25. Min Zhao E, Yang Gen: Homomorphic Encryption Technology for Cloud Computing. In: Elsevier Procedia Computer Science 154, pp. 73 - 83 (2019) https://doi.org/10.1016/j.procs.2019.06.012
  26. Madhu Agarwal Agnihotri, Mahua Pal: Homomorphic Encryption Method for Business Data Security in Cloud. In: Our Heritage (UGC CARE Listed Journal), Vol. 68 (8)
  27. Utkarsh Singh, Abhay Tiwari, Shruti Sharma: Data Security in Cloud Computing. In: International Journal of Engineering Applied Sciences and Technology (IJEAST), vol. 4 (10), ISSN. 2455 - 2143, pp. 170 - 173
  28. Vinay Poduval, Ashish Koul, Daniel Rebello, Karunesh Bhat, Revati M. Wahul: Cloud based Secure Storage of Files using Hybrid Cryptography and Image Steganography. In: International Journal of Recent Technology and Engineering (IJRTE), vol. 8 (6), ISSN. 2277 - 3878, pp. 665 - 667 (2020)  https://doi.org/10.35940/ijrte.F7227.038620