ENCODING-MAT: A Novel Encryption Method to Secure Information in Cloud Storage

Currently, the technological trend that plays a major role for the survival of any business organization is adopting cloud computing. Cloud computing offers dynamism, abstraction and resource sharing which may help an organization succeed in its business. All the resources are as cloud and it serves all over the world. Cloud services give many advantages to all types of business, both small scale and large scale industries. In cloud computing, management of data and services are carried out by the third parties and are not fully trust worthy, so there are many security challenges. The small communication devices like PDA, mobile, IPAD, etc. are widely used as communication devices by the poor and the rich people as well to access data from the cloud. Here, the challenge lies in security and device performance. Encryption methods are widely used techniques to solve the security issues. In this paper, a novel encryption method Encoding MAT is proposed. This paper elaborates on the working of Encoding MAT with the hidden private key and it is compared with that of the existing RSA algorithm.

[1]  Martin Gilje Jaatun,et al.  Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.

[2]  George Reese,et al.  Cloud Application Architectures - Building Applications and Infrastructure in the Cloud , 2009 .

[3]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[4]  Hanim Eken,et al.  Security threats and solutions in cloud computing , 2013, World Congress on Internet Security (WorldCIS-2013).

[5]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[6]  Frederico Araújo Durão,et al.  A systematic review on cloud computing , 2014, The Journal of Supercomputing.

[7]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[8]  M Hemalatha,et al.  An Enhanced Code Encryption Approach with HNT Transformations for Software Security , 2012 .

[9]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[10]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .

[11]  Veer Sain Dixit,et al.  Cloud Computing: State of the Art and Security Issues , 2015, SOEN.

[12]  P. Mythili,et al.  Matrix based cryptographic procedure for efficient image encryption , 2011, 2011 IEEE Recent Advances in Intelligent Computational Systems.

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  Varghese Paul,et al.  A FAST AND SECURE ENCRYPTION ALGORITHM FOR MESSAGE COMMUNICATION , 2007 .

[15]  M. Hemalatha,et al.  Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software , 2013 .

[16]  Wuling Ren,et al.  A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication , 2010, 2010 Second International Conference on Modeling, Simulation and Visualization Methods.

[17]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[18]  Amit Garg Cloud Computing: Security Issues and Challenges , 2013 .

[19]  Kamal Dahbur,et al.  A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.

[20]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[21]  Omer Reingold,et al.  A New Interactive Hashing Theorem , 2007, Computational Complexity Conference.