Comparative Analysis and Implementation of Cryptographic Algorithms in Cloud Computing

The practice of delivering computing services over the internet is referred as cloud computing. Cloud enables users to make use of such software’s and hardware’s that are managed by third parties at faraway location. It includes accessing social networking sites, online business applications, online file storage, and webmail services. Cloud environment provides shared pool of resources, comprising of networks, computer processing power, user applications, specialized corporate, data storage space and much more [1, 2, 13]. Cloud computing is an on-demand network access that can be quickly provisioned and could be conveniently released with insignificant management effort or interaction with service providers. It is because of all these provisions that every organization is willing to move their data to the cloud. Fig. 1 shows the setup of cloud environment.