A Cloud computing-based Advanced Encryption Standard

Today cloud computing is emerging as an indispensable factor in our day-to-day lives. Its fame is rising at an exponential rate along with its growth. It serves its client with distinct computing capabilities like computation, storage, networking, applications, etc., over the internet upon a particular request. Among all the above capabilities, storage plays a crucial role in facilitating its client by giving its framework on rent basis. Even though cloud computing is having a lot of benefits, its acceptance is still lagging behind as a result of security concerns. The information that we keep in clouds is likely to be abused by an unapproved individual or the cloud specialists to cooperate itself. The paper gives a brief idea of cloud computing data security, and various methods are used in ensuring the security of data and we have compared various encryption algorithm used for encrypting data in the cloud.

[1]  Priya Deshpande,et al.  Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm , 2015, 2015 International Conference on Computing Communication Control and Automation.

[2]  E. M. Mohamed,et al.  Enhanced data security model for cloud computing , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[3]  A DineshKumar REVIEW ON TASK SCHEDULING IN UBIQUITOUS CLOUDS , 2019 .

[4]  Stephen S. Yau,et al.  Confidentiality Protection in Cloud Computing Systems , 2010, Int. J. Softw. Informatics.

[5]  Ehud Gudes,et al.  Implementing a database encryption solution, design and implementation issues , 2014, Comput. Secur..

[6]  Sagar Naik,et al.  Software implementation strategies for power-conscious systems , 1999, Mobile Networks and Computing.

[7]  Chien-Hsing Wu,et al.  A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service , 2011, 2011 International Conference on Information Science and Applications.

[8]  S. Smys,et al.  Privacy preserving approaches in cloud computing , 2018, 2018 2nd International Conference on Inventive Systems and Control (ICISC).

[9]  Rajan Mishra,et al.  Comparative Analysis Of Encryption Algorithms For Data Communication , 2011 .

[10]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[11]  Marianne Swanson,et al.  Guide for Developing Security Plans for Information Technology Systems , 1998 .

[12]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[13]  S. Monikandan,et al.  Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm , 2013 .

[14]  M. Gomathy,et al.  STUDY ON SECURITY FRAMEWORKS AND DATA PROTECTION TECHNIQUES FOR PUBLIC CLOUD ENVIRONMENT , 2016 .

[15]  Kwan-Hee Yoo,et al.  A Content Oriented Smart Education System based on Cloud Computing , 2013, MUE 2013.