Now a day, Security is becoming a main concern to maintain confidentiality and integrity of the data. For this purpose, cryptography techniques are used. Cryptography is used to encrypt the data into nonreadable format and decrypt it again into readable format when needed using specific key. Also for business perspective, cloud computing is very useful. Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because of the opportunities it is offering. It has different meaning to different uses according to their need. According to a business man, it is used to store and access the data to fulfill the memory requirement and consistency. Also secure data transmission feature of cloud computing plays a very important role in business perspective. For using cloud computing, business man has to pay specific amount of money to the cloud service provider. Cloud service provider guaranty either the confidentiality or integrity of the data. This paper proposes and implements the idea of sending already encrypted file through cloud in spite of the original file using RSA and DES algorithm of cryptography. As encrypted file is transmitted, so original file is not available even at the network. So even if any intermediate user sees the data, he will not be able to understand the data. That’s why confidentiality and integrity is maintained by this. Hence security of cloud data will be increased. This work can be enhanced using hybrid approach by integrating multiple cryptography algorithms. Keyword: Cloud Computing, Cryptography, RSA, DES, Security.
[1]
Prashant Sharma,et al.
RSA algorithm using modified subset sum cryptosystem
,
2011,
2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[2]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[3]
Borko Furht,et al.
Cloud Computing Fundamentals
,
2010,
Handbook of Cloud Computing.
[4]
C. R. S Bhardwaj.
Modification of Des Algorithm
,
2012
.
[5]
Behrouz A. Forouzan,et al.
Cryptography and network security
,
1998
.
[6]
Ian Lumb,et al.
A Taxonomy and Survey of Cloud Computing Systems
,
2009,
2009 Fifth International Joint Conference on INC, IMS and IDC.
[7]
Prashant Pandey,et al.
Cloud computing
,
2010,
ICWET.
[8]
Sawan Kumar,et al.
Ensuring data storage security in Cloud Computing
,
2009,
2009 17th International Workshop on Quality of Service.