Open Access   Article Go Back

IMPLEMENTATION OF CRYPTOGRAPHY TECHNIQUES IN CLOUD COMPUTING

Shaffy Bansal1 , Vijay Bhardwaj2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 285-289, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.285289

Online published on Oct 31, 2018

Copyright © Shaffy Bansal, Vijay Bhardwaj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shaffy Bansal, Vijay Bhardwaj, “IMPLEMENTATION OF CRYPTOGRAPHY TECHNIQUES IN CLOUD COMPUTING,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.285-289, 2018.

MLA Style Citation: Shaffy Bansal, Vijay Bhardwaj "IMPLEMENTATION OF CRYPTOGRAPHY TECHNIQUES IN CLOUD COMPUTING." International Journal of Computer Sciences and Engineering 6.10 (2018): 285-289.

APA Style Citation: Shaffy Bansal, Vijay Bhardwaj, (2018). IMPLEMENTATION OF CRYPTOGRAPHY TECHNIQUES IN CLOUD COMPUTING. International Journal of Computer Sciences and Engineering, 6(10), 285-289.

BibTex Style Citation:
@article{Bansal_2018,
author = {Shaffy Bansal, Vijay Bhardwaj},
title = {IMPLEMENTATION OF CRYPTOGRAPHY TECHNIQUES IN CLOUD COMPUTING},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {285-289},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3019},
doi = {https://doi.org/10.26438/ijcse/v6i10.285289}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.285289}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3019
TI - IMPLEMENTATION OF CRYPTOGRAPHY TECHNIQUES IN CLOUD COMPUTING
T2 - International Journal of Computer Sciences and Engineering
AU - Shaffy Bansal, Vijay Bhardwaj
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 285-289
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
393 256 downloads 236 downloads
  
  
           

Abstract

Cloud computing is the set of IT services that are provided by cloud service provider to the users over the Internet. It is Pay-per-use for On-demand service. The main concern of the cloud computing is Security. In this paper, studies the basics of cloud computing and two main encryption/decryption algorithms that are AES (Advanced Encryption Standard) and DES (Data Encryption Standard). The paper shows the implementation of AES and DES algorithms for the conversion of Plaintext to Cipher text.

Key-Words / Index Term

AES, DES, cloud computing, issues, cryptography, plaintext, cipher text

References

[1]. Kevin Hamlen et al.; (April-June 2010) International Journal of Information Security and Privacy, 4 (2), 39-51, April-June 2010 39,”Security issues for Cloud Computing”.
[2]. Rabi Prasad Padhy et al. (December 2011) IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, “Cloud Computing: Security issues and Challenges”.
[3]. Manpreet Kaur et al. (June 2015), International Journal of Advances in Engineering & Technology, June 2015, © IJAET ISSN: 22311963,” A Review of Cloud Computing Security Issues”.
[4]. Leena Khanna, Anant Jaiswal, “Cloud Computing: Security Issues and Description of Encryption Based Algorithms to Overcome Them”, IJARCSSE 2013