Minimization of System Resources for Cloud based Application using Web Browser Add On

Evolution of cloud makes users to manage the data and applications online. It is the responsibility of the cloud service providers to care of data secure in terms of transferring and efficient by providing reliable performance. There are many challenges that are faced by the service providers to achieve the trust of the user. User feels insecure while the data is send to the cloud servers, when the data is more confident and uses applications that provide security to the data (by encryption and decryption). These applications to encrypt data will consume more time and systems resources. All these applications work depending upon the operating system of the user. This proposed approach will reduce user's burden in interacting to the cloud through browsers add-on. This add-on is designed by AES encryption methodology with a SHA-2 key which is proved to be secure. The main aim of this paper is to explore various environments and design cloud based applications which are more user friendly at the same time reduce hardware cost. This design also highlights a threat to the mailing servers as they can't find the transmitting information from the user.

[1]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[2]  S. El Hajji,et al.  Homomorphic encryption method applied to Cloud Computing , 2012, 2012 National Days of Network Security and Systems.

[3]  Iram Ahmad,et al.  Homomorphic Encryption Method Applied to Cloud Computing , 2014 .

[4]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[5]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[6]  Sandeep K. Sood,et al.  A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..

[7]  William H. Sanders,et al.  Secloud: A cloud-based comprehensive and lightweight security solution for smartphones , 2013, Comput. Secur..

[8]  Jie Wu,et al.  Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..

[9]  Ching-Hao Mao,et al.  Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life Cycle , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[10]  Martin Gilje Jaatun,et al.  A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[11]  E. M. Mohamed,et al.  Randomness testing of modern encryption techniques in cloud environment , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[12]  Yang Gao,et al.  Secure cloud storage based on cryptographic techniques , 2012 .

[13]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[14]  P. Varalakshmi,et al.  Integrity checking for cloud environment using encryption algorithm , 2012, 2012 International Conference on Recent Trends in Information Technology.

[15]  Sherali Zeadally,et al.  Analyzing the security of Windows 7 and Linux for cloud computing , 2013, Comput. Secur..

[16]  Yi Mu,et al.  Privacy enhanced data outsourcing in the cloud , 2012, J. Netw. Comput. Appl..

[17]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..