Whenever one decides to travel from his/her source to destination, he/she boards a bus or a train. After taking a ticket, the person hold back to his/her seat till the destination is reached. Similarly other passengers in the bus or train takes their particular tickets as per their individual destinations and it hardly bothers one where they go. Same is the story in case of cloud computing. Cloud computing is very similar to such a bus or a train which carries data and information for multiple and different users and permits them to access its service at minimal cost. The term “Cloud” originated from a network design that was utilized by concerned network engineers to represent the location of different network devices and inter-connection among them [1, 5]. The Fig. 1 below displays the set up involved in cloud computing.
[1]
Ritu Pahal.
Efficient Implementation of AES
,
2013
.
[2]
Rajiv Munjal,et al.
Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures
,
2011
.
[3]
Priyadarshini Patil,et al.
A Comprehensive Evaluation of Cryptographic Algorithms
,
2016
.
[4]
Gurpreet Kaur,et al.
Implementation of DES and AES Cryptographic Algorithms in Accordance with Cloud Computing
,
2017
.
[5]
Neelam Sharma,et al.
Implementation of AES algorithm
,
2016
.
[6]
Shaffy Bansal,et al.
Analyzing Working of DES and AES Algorithms in Cloud Security
,
2017
.