ISSN

2231-3915 (Online)
2231-3907 (Print)


Author(s): Vijayant Verma, Anil Kumar Tiwari

Email(s): vijayant_v@rediffmail.com , anil1969_rpr@yahoo.com

DOI: 10.5958/2231-3915.2020.00017.6   

Address: Dr. Vijayant Verma1*, Dr. Anil Kumar Tiwari2
1*Department of Computer Science, Disha College, Ramnagar Kota Road, Pt. R.S.S.University, Raipur, India.
2Department of Computer Science, Disha College, Ramnagar Kota Road, Pt. R.S.S.University, Raipur, India.
*Corresponding Author

Published In:   Volume - 10,      Issue - 1,     Year - 2020


ABSTRACT:
Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel or software systems. Cloud computing help business to improves their organization by using the services the cloud provider offer such as shared network, valuable resources bandwidth, software and hardware in a cost effective manner. In addition cloud computing originated from a commercial enterprise concept and developed into a flourishing IT invention. Security is an important factor of cloud computing to ensure that the client data is placed in a secure place. These days regarding to the high demand on using the cloud computing services for storing and processing data, these is awareness about the information security and cloud computing. In this research paper , we are focusing on what encryption a client need before choosing a cloud provider , because good encryption will help you to protect your data when you share it or use it, but if it is not consider before the client will hand up losing data, paying more money to cloud provider because the encryption offering by the cloud doesn’t much with his need. Here we are going to compare two encryption technology – Symmetric (DES and AES), asymmetric(RSA) algorithm. We have found that the encryption needed will depend on the confidentiality of your data, if the data confidentiality is high you will need a strong encryption such as RSA. If not you will need DES as encryption, so analyzing your data confidentiality is very important before deciding on which encryption to take.


Cite this article:
Vijayant Verma, Anil Kumar Tiwari. Analytic study of data security in Cloud Computing using Cryptography. Int. J. Tech. 2020; 10(1):88-92. doi: 10.5958/2231-3915.2020.00017.6


REFERENCES:
1.    Yarlagadda, Vamsee Krishna, and Sriram Ramanujam, "Data Security in Cloud Computing, " Journal of Computer and Mathematical Sciences Vol, pp. 1-169, 2011.
2.    M. Sudha, "Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography," Advances in Computer Science and its Applications, pp. 32-37, 2012.
3.    S. Sanyal, and P. P. Iyer, “Cloud Computing--An Approach with Modern Cryptography,” arXiv preprint arXiv:1303.1048, 2013.
4.    K. Rauber, “Cloud Cryptography,” International Journal of Pure and Applied Mathematics, vol. 85, no. 1, pp. 1- 11, 2013.
5.    S Nepal, S. Chen, and J. Yao, "DIaaS: Data integrity as a service in the cloud," Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 308-315, 2011.
6.    M. Raykova, H. Zhao, and S. Bellovin, "Privacy enhanced access control for outsourced data sharing," Financial Cryptography and Data Security, pp. 223-238, 2012
7.    Z. Hao, S. Zhong, and N. Yu, "A privacy preserving remote data integrity checking protocol with data dynamics and public verifiability," Knowledge and Data Engineering, IEEE Transactions on, vol. 23, no. 9, pp. 1432- 1437, 2011.
8.    R. Paul, “Checkpoint-based Intelligent Fault tolerance For Cloud Service Providers,” International Journal of Computers and Distributed Systems, vol. 2, no. 1, pp. 59-64, 2012.
9.    Y. Zheng, "Public Key Cryptography for Mobile Cloud," Information Security and Privacy, Lecture Notes in Computer Science C. Boyd and L. Simpson, eds., pp. 435- 435: Springer Berlin Heidelberg, 2013.

Recomonded Articles:

Author(s): Satish Garg, Priyanka Vaishist, S. P. Gupta

DOI: 10.5958/2231-3915.2016.00009.2         Access: Open Access Read More

Author(s): Satish Kumar Chandel

DOI: 10.5958/2231-3915.2016.00022.5         Access: Open Access Read More

Author(s): P. L. Sharma, Kiran Devi

DOI: 10.5958/2231-3915.2016.00023.7         Access: Open Access Read More

Author(s): Satish Kumar Garg

DOI: 10.5958/2231-3915.2016.00031.6         Access: Open Access Read More

Author(s): Ruchi Verma, Vinti Nanda

DOI:         Access: Open Access Read More

Author(s): Deepti Verma, Gitanjali Sinha

DOI:         Access: Open Access Read More

Author(s): Preeti Agrawal, Yogesh Rathore

DOI:         Access: Open Access Read More

Author(s): Ajay Kumar Gupta, S. P. Singh

DOI:         Access: Open Access Read More

Author(s): Sulakshana Bhariya, Guide Jagveer Verma

DOI:         Access: Open Access Read More

Author(s): Sanjay Kumar Baghel, Bhupesh Kumar Dewangan

DOI:         Access: Open Access Read More

Author(s): Aamir Hasan, V. K. Patle, Sanjay Kumar

DOI:         Access: Open Access Read More

Author(s): P. L. Sharma, S. Sharma

DOI:         Access: Open Access Read More

Author(s): P. L. Sharma, M. Rehan

DOI:         Access: Open Access Read More

Author(s): Narendra Kumar Dewangan*, Nilmani Verma, Sandeep Gonnade

DOI:         Access: Open Access Read More

Author(s): V.R. Prasath Kumar, L. Krishnaraj, Jagadish Raj

DOI: DOI: 10.5958/2231-3915.2015.00005.X         Access: Open Access Read More

Author(s): Prasad KV, Nikhil Bhat S, Vasugi V, Venkatesan R

DOI: 10.5958/2231-3915.2015.00034.6         Access: Open Access Read More

Author(s): Satish Kumar, V.K. Bansal

DOI:         Access: Open Access Read More

International Journal of Technology (IJT) is an international, peer-reviewed journal, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology...... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2231-3915 


Recent Articles




Tags