Vijayant Verma, Anil Kumar Tiwari
email@example.com , firstname.lastname@example.org
Dr. Vijayant Verma1*, Dr. Anil Kumar Tiwari2
1*Department of Computer Science, Disha College, Ramnagar Kota Road, Pt. R.S.S.University, Raipur, India.
2Department of Computer Science, Disha College, Ramnagar Kota Road, Pt. R.S.S.University, Raipur, India.
Volume - 10,
Issue - 1,
Year - 2020
Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel or software systems. Cloud computing help business to improves their organization by using the services the cloud provider offer such as shared network, valuable resources bandwidth, software and hardware in a cost effective manner. In addition cloud computing originated from a commercial enterprise concept and developed into a flourishing IT invention. Security is an important factor of cloud computing to ensure that the client data is placed in a secure place. These days regarding to the high demand on using the cloud computing services for storing and processing data, these is awareness about the information security and cloud computing. In this research paper , we are focusing on what encryption a client need before choosing a cloud provider , because good encryption will help you to protect your data when you share it or use it, but if it is not consider before the client will hand up losing data, paying more money to cloud provider because the encryption offering by the cloud doesn’t much with his need. Here we are going to compare two encryption technology – Symmetric (DES and AES), asymmetric(RSA) algorithm. We have found that the encryption needed will depend on the confidentiality of your data, if the data confidentiality is high you will need a strong encryption such as RSA. If not you will need DES as encryption, so analyzing your data confidentiality is very important before deciding on which encryption to take.
Cite this article:
Vijayant Verma, Anil Kumar Tiwari. Analytic study of data security in Cloud Computing using Cryptography. Int. J. Tech. 2020; 10(1):88-92. doi: 10.5958/2231-3915.2020.00017.6
1. Yarlagadda, Vamsee Krishna, and Sriram Ramanujam, "Data Security in Cloud Computing, " Journal of Computer and Mathematical Sciences Vol, pp. 1-169, 2011.
2. M. Sudha, "Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography," Advances in Computer Science and its Applications, pp. 32-37, 2012.
3. S. Sanyal, and P. P. Iyer, “Cloud Computing--An Approach with Modern Cryptography,” arXiv preprint arXiv:1303.1048, 2013.
4. K. Rauber, “Cloud Cryptography,” International Journal of Pure and Applied Mathematics, vol. 85, no. 1, pp. 1- 11, 2013.
5. S Nepal, S. Chen, and J. Yao, "DIaaS: Data integrity as a service in the cloud," Cloud Computing (CLOUD), 2011 IEEE International Conference on, pp. 308-315, 2011.
6. M. Raykova, H. Zhao, and S. Bellovin, "Privacy enhanced access control for outsourced data sharing," Financial Cryptography and Data Security, pp. 223-238, 2012
7. Z. Hao, S. Zhong, and N. Yu, "A privacy preserving remote data integrity checking protocol with data dynamics and public verifiability," Knowledge and Data Engineering, IEEE Transactions on, vol. 23, no. 9, pp. 1432- 1437, 2011.
8. R. Paul, “Checkpoint-based Intelligent Fault tolerance For Cloud Service Providers,” International Journal of Computers and Distributed Systems, vol. 2, no. 1, pp. 59-64, 2012.
9. Y. Zheng, "Public Key Cryptography for Mobile Cloud," Information Security and Privacy, Lecture Notes in Computer Science C. Boyd and L. Simpson, eds., pp. 435- 435: Springer Berlin Heidelberg, 2013.