Open Access   Article Go Back

Comprehensive Review on Encryption Algorithms for Multimedia Cloud Computing

Er. Ramandeep Kaur1 , Er.Gurjot Kaur2 , Er.Reena Sharma3 , Er.Varinder Kaur4

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 328-331, May-2015

Online published on May 30, 2015

Copyright © Er. Ramandeep Kaur, Er.Gurjot Kaur, Er.Reena Sharma, Er.Varinder Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Er. Ramandeep Kaur, Er.Gurjot Kaur, Er.Reena Sharma, Er.Varinder Kaur, “Comprehensive Review on Encryption Algorithms for Multimedia Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.328-331, 2015.

MLA Style Citation: Er. Ramandeep Kaur, Er.Gurjot Kaur, Er.Reena Sharma, Er.Varinder Kaur "Comprehensive Review on Encryption Algorithms for Multimedia Cloud Computing." International Journal of Computer Sciences and Engineering 3.5 (2015): 328-331.

APA Style Citation: Er. Ramandeep Kaur, Er.Gurjot Kaur, Er.Reena Sharma, Er.Varinder Kaur, (2015). Comprehensive Review on Encryption Algorithms for Multimedia Cloud Computing. International Journal of Computer Sciences and Engineering, 3(5), 328-331.

BibTex Style Citation:
@article{Kaur_2015,
author = {Er. Ramandeep Kaur, Er.Gurjot Kaur, Er.Reena Sharma, Er.Varinder Kaur},
title = {Comprehensive Review on Encryption Algorithms for Multimedia Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {328-331},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=527},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=527
TI - Comprehensive Review on Encryption Algorithms for Multimedia Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Er. Ramandeep Kaur, Er.Gurjot Kaur, Er.Reena Sharma, Er.Varinder Kaur
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 328-331
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2589 2279 downloads 2506 downloads
  
  
           

Abstract

With the advancement on the web, internet interactive media is rising as an administration. To provide rich media services, process, multimedia computing has emerged as a noteworthy technology to produce, edit and examine media contents, such as images, graphics, video, audio and so on. For media application and administrations over the internet and portable remote system, there are solid request for distributed computed computing on account of noteworthy measure of calculation needed for serving a huge number of internet or versatile client in the meantime. This paper audits the brief study on sight and sound distributed computing perspectives and described some security issues in cloud computing, including data integrity, data confidentiality, access control, data manipulation in the encrypted data domain etc. along with security algorithms.

Key-Words / Index Term

Cloud Computing, Multimedia, Cryptography, Internet

References

[1] Akhil Kaushik, Krishan Gupta and Satvika, “Ask cipher for small amount of data,” 978-1-4799-2995-5/14/$31.00@IEEE, February 2014.
[2] Bhavna Makhija, Vinit Kumar Gupta and Indrajit Rajput, “Enhanced data security in cloud computing with third party auditor,” ijarcsse,vol.3, no.2, February2013.
[3] Deyan Chen and Hong Zhao “Data Security and Privacy Protection Issues in Cloud Computing,” 2012 IEEE International Conference on Computer Science and Electronics Engineering.
[4] Dr.A.Padmapriya, P .Subhasri, “Cloud Computing: Security Challenges & Encryption Practices,” Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.
[5] Gartner: Seven cloud-computing security risks InfoWorld 2008-07-02.
[6] Gurpreet Kaur and Manish Mahajan, “Analyzing data Security for cloud computing using cryptographic algorithms,” ijera, vol.3, no.5, Sep-Oct 2013.
[7]http://www.mytestbox.com/miscellaneous/cloud-computing-grid-computing-utility- computing-list-top-providers/
[8] K.S.Suresh “ Security Issues and Security Algorithms in Cloud Computing,” International Journal of Advanced Research in Computer Science and Software Engineering.
[9]Leena Khanna “ Cloud Computing: Security Issues And Description Of Encryption Based Algorithms To Overcome Them,” Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.
[10] Maha TEBAA, Saïd EL HAJJI and Abdellatif EL GHAZI, “Homomorphic Encryption Applied to the Cloud Computing Security,” Proceedings of the World Congress on Engineering, Vol.1, WCE 2012, July 4 (2012), London, U.K .
[11] Mr. D. Kishore Kumar “Cloud Computing: An Analysis of Its Challenges & Security Issues,” International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012 www.ijcsn.org ISSN 2277-5420.
[12] Mr. PrashantRewagad, and Ms.YogitaPawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing,” 978-0-7695-4958-3/13 $26.00 © 2013 IEEE.

[13] Randeep Kaur and Supriya Kinger, “Analysis of security algorithms in cloud computing,” ijaiem, vol.3, no.3, March 2014.
[14] Uma Somani, Kanika Lakhani, and Manish Mundra “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing,” 2010 IEEE 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
[15] Vahid Ashktorab2, Seyed Reza Taghizadeh1 “Security Threats and Countermeasures in Cloud Computing,” International Journal of Application or Innovation in Engineering & Management (IJAIEM).
[16] Volker Fusenig and Ayush Sharma “Security Architecture for Cloud Networking,” 2012 IEEE International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium.