Enhanced cloud data security using AES algorithm

Cloud computing is the revolution through which individuals can share resources, services and data among the users through the network. Since millions of users uses the same network for data transfer, the data becomes more vulnerable to different security attacks from intruders. Providing security to these data has become the critical area of concern. The current system for data security concentrates on providing security to the stored data in cloud storage but concerns less on securing the data while it is being transferred. The data becomes prone to intruder attacks while being transferred. Also, in the current existing trend, the third party auditor is given access to data during data transfer. This also increases the access vulnerability of data as the intruder could act as third party and gain access to the data. Considering security as a crucial issue, the system proposed concentrates on providing security to transferring data using encryption technique. The system also takes into consideration the issue concerned with the third party auditor, that in the proposed approach, the auditor is denied access to the user data. Experiments are conducted and has shown that the proposed approach increases the overall security of system by making it difficult for intruders to crack the data being transferred.

[1]  Shadi R. Masadeh,et al.  A comparison of data encryption algorithms with the proposed algorithm: Wireless security , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[2]  Jaime Raigoza,et al.  Evaluating Performance of Symmetric Encryption Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[3]  R. Umarani,et al.  A Survey on Various Most Common Encryption Techniques , 2012 .

[4]  Obulam Suguna Mani,et al.  A New Method in Symmetric Encryption for block cipher module: A Bit Shifting Approach , 2012 .

[5]  M. Hadhoud,et al.  A New Method in Symmetric Encryption for block cipher module : A Bit Shifting Approach , 2011 .

[7]  Maged Hamada Ibrahim,et al.  A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..

[8]  S. Durga Bhavani,et al.  A Modified Hill Cipher Involving Interweaving and Iteration , 2010, Int. J. Netw. Secur..

[9]  R. Kaur,et al.  Effective Symmetric Key Block Ciphers Technique for Data Security: RIJNDAEL , 2014 .

[10]  R. Radhakrishnan,et al.  An improved log-based scheduling and load balancing in computational grid , 2015 .

[11]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[12]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[13]  Shaikh Abdul Hannan,et al.  A Review on Classical and Modern Encryption Techniques , 2014 .

[14]  Julian R. Ullmann,et al.  An Algorithm for Subgraph Isomorphism , 1976, J. ACM.

[15]  Akash Kanthale,et al.  Survey on Cloud Computing Security Algorithms , 2016 .

[16]  Anupama Mishra,et al.  ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS , 2013 .

[17]  R. Sandhya,et al.  Dynamic load balancing for cloud partition in public cloud model using VISTA scheduler algorithm , 2016 .

[18]  Parsi Kalpana,et al.  Data Security in Cloud Computing using RSA Algorithm , 2012 .

[19]  Sudhansu Ranjan Lenka,et al.  Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm , 2014 .

[20]  D Srinivasarao,et al.  ANALYZING THE SUPERLATIVE SYMMETRIC CRYPTOGRAPHIC ENCRYPTION ALGORITHM ( ASCEA) , 2011 .