Data encryption in virtual machine transfer over cloud network

Cloud computing has evolved to a great extent over the years. The concept of the cloud lies in the efficient storage of data through resource allocation at a very low cost. The building blocks of cloud are distributed virtual servers over different geographical locations. Virtual machines transfer data over the network from one physical server to another, an efficient algorithm or model is required for this purpose. The integrity and confidentiality of data needs to be maintained. This paper proposes an algorithm ASCII XORING which aims to encrypt data stored in the virtual machine and its transfer over the network.

[1]  Mladen A. Vouk,et al.  Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.

[2]  K Lalitha,et al.  SEDAS: A Self Destruction for Protecting DataPrivacy in Cloud Storage As A Service Model , 2014 .

[3]  Alan McQuinn,et al.  Unlocking Encryption: Information Security and the Rule of Law , 2016 .

[4]  M. Malathi,et al.  Cloud computing concepts , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[5]  Shankar Gadhve,et al.  Self Destruction System for Protecting Data Privacy in Cloud Storage , 2015 .

[6]  P. N. Chatur,et al.  Cloud Computing and Security Models: A Survey , 2012 .

[7]  Bruno Raffin,et al.  Performance Evaluation of Intel Xeon Phi Coprocessor using XKaapi , 2013 .

[8]  Darrell M. West,et al.  Privacy and Security in Cloud Computing , 2010 .

[9]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[10]  Randhir Kumar,et al.  Analysis of Diffie Hellman Key Exchange Algorithm with Proposed Key Exchange Algorithm , 2015 .

[11]  S Savitha,et al.  Time Controlled Cloud Environment with Self destructing Data system (SeDas) for Data Confidentiality , 2014 .

[12]  Vikrant Chole,et al.  Review on Self-Destructive System for Data Privacy on Web Services , 2015 .

[13]  Mladen A. Vouk,et al.  Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.

[14]  Sudipta Giri,et al.  Enhancing Security in Cloud by Self Destruction Mechanism , 2015 .