The practice of delivering computing services over the internet is referred as cloud computing. Cloud enables users to make use of such software’s and hardware’s that are managed by third parties at faraway location. It includes accessing social networking sites, online business applications, online file storage, and webmail services. Cloud environment provides shared pool of resources, comprising of networks, computer processing power, user applications, specialized corporate, data storage space and much more [1, 2, 13]. Cloud computing is an on-demand network access that can be quickly provisioned and could be conveniently released with insignificant management effort or interaction with service providers. It is because of all these provisions that every organization is willing to move their data to the cloud. Fig. 1 shows the setup of cloud environment.
[1]
Ritu Pahal.
Efficient Implementation of AES
,
2013
.
[2]
Priyadarshini Patila,et al.
A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish
,
2016
.
[3]
Rajiv Munjal,et al.
Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures
,
2011
.
[4]
Neelam Sharma,et al.
Implementation of AES algorithm
,
2016
.
[5]
Gurpreet Kaur,et al.
Implementation of DES and AES Cryptographic Algorithms in Accordance with Cloud Computing
,
2017
.
[6]
Shaffy Bansal,et al.
Analyzing Working of DES and AES Algorithms in Cloud Security
,
2017
.