Open Access   Article Go Back

An Performance Analysis of Encryption Algorithm in Cloud Computing

Shivlal Mewada1 , Arti Sharivastava2 , Pradeep Sharma3 , N Purohit4 , S.S. Gautam5

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-2 , Page no. 83-89, Feb-2015

Online published on Feb 28, 2015

Copyright © Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, N Purohit , S.S. Gautam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, N Purohit , S.S. Gautam, “An Performance Analysis of Encryption Algorithm in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.83-89, 2015.

MLA Style Citation: Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, N Purohit , S.S. Gautam "An Performance Analysis of Encryption Algorithm in Cloud Computing." International Journal of Computer Sciences and Engineering 3.2 (2015): 83-89.

APA Style Citation: Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, N Purohit , S.S. Gautam, (2015). An Performance Analysis of Encryption Algorithm in Cloud Computing. International Journal of Computer Sciences and Engineering, 3(2), 83-89.

BibTex Style Citation:
@article{Mewada_2015,
author = {Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, N Purohit , S.S. Gautam},
title = {An Performance Analysis of Encryption Algorithm in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2015},
volume = {3},
Issue = {2},
month = {2},
year = {2015},
issn = {2347-2693},
pages = {83-89},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=409},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=409
TI - An Performance Analysis of Encryption Algorithm in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Shivlal Mewada, Arti Sharivastava, Pradeep Sharma, N Purohit , S.S. Gautam
PY - 2015
DA - 2015/02/28
PB - IJCSE, Indore, INDIA
SP - 83-89
IS - 2
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2685 2372 downloads 2493 downloads
  
  
           

Abstract

Security is the most important factor in cloud computing for ensuring client data is placed on secure mode in the cloud. Cloud computing is a flexible, cost-effective and proven delivery platform for providing business. Main goal of cloud computing is to provide easily scalable access to computing resources to improve organization performance. In this research paper we have discussed the problem of data security in cloud and show performance analysis to enhance security in terms of encryption algorithm and also explain an overview of cloud and security issues.

Key-Words / Index Term

Cloud Computing, Security Algorithm, AES, DES, Blowfish and RSA

References

[1]. Er. Rimmy Chuchra ,”data security in cloud computing “,International Journal of Societal Application of computer science, Volume -01, Issue -1,Page N0 (1-5),1 Nov 2012.
[2]. Rajkumar Buya and Chee Yeo and Shrikumar,” Cloud computing and emerging IT Platform:vision,hype and reality for delivery computing as the 5thutility”, Future generation computer system 2009,Page No.(1-15),21 November 2008.
[3]. Bhushan Lalsahu and RajeshTiwari ,”A Comprehensive study on cloud computing” , International Journal of Advanced Research in Computer Science and Software Engineering “,Vol ume-2,Issue -9, Page No.(33-36),September 2012,ISSN 2277.
[4]. M.Vijayapriya ,”Security algorithm incloudcomputing:overview”, International Journal of Computer Science and Software Engineering Technology ,Volume-4, Issue-4 ,Page No.(1209-1211),09 September 2013.
[5]. Keiko Hashizume and David G Rosago and Eduardo Fernandez ,”an analysis of security issue for cloud computing “ , A Springer Open Journal of Internet Services and Applications, Volume No-4, Issue -5, Page No(22-26),27 February 2013.
[6]. Rashmi and Dr.GSahoo and Dr. S.Mehfuz, ” Securing software as a service model of cloud computing issue and solution, “International Journal of Cloud Computing Services and Architecture “,Volume -3,Page No(1-11), Issue -2 ,Augest 2013.
[7]. Shivlal Mewada and Umesh kumar Singh and Pradeep Sharma, ”Security Based for Cloud Computing”,“International Journal of Computer Network and Wireless Communication“ ,Volume -1,Issue -1,Page No (13-17),1december 2011.
[8]. Mandieep Kaur and Manish Mahajan ,” International Journal of Communication and Computer Technologies “, Volume -1,Issue-3, Page No.(56-59), January 2013.
[9]. Divya Rastogi and Nikunj Kumar,” Study of Security Issue in layer in Cloud Computing “, International Journal Of Research Review In Engineering Science & Technology,Volume -2,Issue -2,Page No(30-33),June 2013.
[10]. Parsi kalpna and Sudha Singaraju,”Data Security in Cloud Computing Using RSA Algorithm”, International Journal of Research in Computing communication Technologies , Volume- 1 ,Issue -4,Page No(143-146),4 sep2012.
[11]. Debajyoti and Mukhopadhyay and GiteshSonawane and Parth Sarthi Gupta,”Enhanced Security for cloud storage using file encryption”, International Journal Of Research Review In Information Tchnology ,Department of IT ,Volume -2,Issue -1Page No(11-15), 2013.
[12]. NehaTirthaniGenesenr.”Data security in cloud arxhitecture based on Diffie Hellman and Elliptical curve cryptography”, Volume- 1,Issue-1,Page No [1-4].
[13]. B.N. singh ,”Cloud Development Model”, example [online available ]20 may 2014.
[14]. Kai hwag and Deyili,” Trusted Cloud Computing with Secure Resources and Data coloring”,IEEE ,Volume- 14,Issue-5,Page No(14-22),2010.
[15]. V.D cunsolo and S.distenfo,” Achieving information security in network computing system”,IEEE,Page No (77,-80),Dec 2009
[16]. Dr.Sunil Batra and Anju chibel ,”Preliminary Analysis of Cloud Computing Vulnerabilities”, Journal of Engineering computer and Applied science ,Volume- 2 ,Issue -5,Page No(49-51),May 2013.
[17]. Venkata Krishna kumar and S padma priya ,” A survy of cloud computing security threat and vulnerabilities “,International journal of innovative research in electrical, electronics, instrumentation and control engineering ,Volume- 2 ,Issue -1,Paga No(622-625),January 2014.
[18]. A.T. valte and T.J.velte and R.C.,” Cloud Computing a Practical Approach “ Tata McGraw -Hill,First(I st) Edition,USA 2009.
[19]. Farzadsabhi,”Cloud Computing Threat and Responses” ,IEEE, Page No(245-249) ,27-29 may-2011
[20]. Ros and jacobo,” Security in Cloud the Threat of co exits with an unkown tenant on a public environment” , Page No(), Royal Holloway ,University of London
[21]. Gurpreet Kaur and Manish Mahajan, ”Evolution and Comparison of Symmetric Key algorithms”, International Journal of Science ,Engineering and Technology Research, Volume-2,Issue -10, Page No(1960-1962),October 2013,ISSN 2278-7798.
[22]. Vijeyta Devi and Vadlamani Nagalakshmi, ”A Prospective Approach on Security with RSA algorithm and cloud sql in cloud computing”, International Journal of Computer Science and Engineering ,Volume n-2,Issue -2 ,Page No(35-44),May 2013.
[23]. Uma Somani ,”Implementation Digital Signature with RSA Encryption algorithm to enhance the data security of cloud in cloud computing”,2010.
[24]. Ms. Disha H. Parekh and Dr. R. Sridaran,” An Analysis of Security Challenges in Cloud Computing”, Volume – 4,Issue-1, page No.(30-44),2013.
[25]. Navneet Sharma and Vijay Singh Rathore, ” Different Data Encryption Methods Used in Secure Auto Teller Machine Transactions”, Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, Page No.(176-177) April 2012.
[26]. Madhu Chauhan and Riidhei Malhotra and Mukul Pathak and Uday Pratap,“DIFFERENT ASPECTS OF CLOUD SECURITY “ , International Journal of Engineering Research and Applications, Volume -2 ,Issues-2,Page No.(864- 870) , Mar-Apr 2012.