CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Survey on Data Security in Cloud Computing using Cryptography

by M. Vedaraj, M. Vigilson Prem
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 4
Year of Publication: 2017
Authors: M. Vedaraj, M. Vigilson Prem
10.5120/ijca2017915815

M. Vedaraj, M. Vigilson Prem . A Survey on Data Security in Cloud Computing using Cryptography. International Journal of Computer Applications. 178, 4 ( Nov 2017), 37-40. DOI=10.5120/ijca2017915815

@article{ 10.5120/ijca2017915815,
author = { M. Vedaraj, M. Vigilson Prem },
title = { A Survey on Data Security in Cloud Computing using Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 178 },
number = { 4 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 37-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number4/28664-2017915815/ },
doi = { 10.5120/ijca2017915815 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:49:30.195302+05:30
%A M. Vedaraj
%A M. Vigilson Prem
%T A Survey on Data Security in Cloud Computing using Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 4
%P 37-40
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is the latest technology through which people can share resources, services and information among the people through use of internet. Since we share the data through the internet, security is considered as a major issue. In Cloud computing several security issues arises like confidentiality, integrity and authentication. Most of the time the data passed via internet might contain confidential or personal information which many people would want to be protected against attacks. Various data encryption algorithms has been developed to make sure that the data transmitted via internet is secure from any sort of hacking or attacks. Several cryptographic algorithms also have been developed for encryption and with each one having some advantages and disadvantages. This paper presents a detailed study of symmetric and asymmetric encryption/decryption algorithms and its advantages and disadvantages.

References
  1. William Stallings, “Cryptography And network Security: Principles and Practice second edition”, ISBN 0-13869017-0, 1995 by Prentice- Hall, Inc. Simon & Schuster / A Viacom Company Upper Saddle River, New Jersey 07458.
  2. Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin, Shariar Md. Imtiaz, “Performance Analysis of Different Cryptography Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 6, Issue 3, March 2016.
  3. Swati Kashyap, Er.Neeraj Madan “A Review on: Network Security and Cryptographic Algorithm” International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 4, April 2015.
  4. B.Nithya, Dr.P.Sripriya, “A Review of Cryptographic Algorithms in Network Security” International Journal of Engineering and Technology (IJET) Vol 8 No 1 Feb-Mar 2016.
  5. Saurabh Sindhu, Divya Sindhu, “Cryptographic Algorithms: Applications in Network Security”, International Journal of New Innovations in Engineering and Technology Volume 7 Issue 1– February 2017.
  6. Prerna Mahajan & Abhishek Sachdeva,”A study of Encryption Algorithms AES, DES and RSA for Security”, Global journal of Computer Science and Technology, Vol.8,No.15, (2013) pp.15-22.
  7. Jitendra Singh Laser, Viny Jain, “A Comparative Survey of various Cryptographic Techniques” International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 03 | Mar-2016.
  8. Priyanka Arora, Arun Singh, Himanshu Tyagi “ Evaluation and Comparison of Security Issues on Cloud Computing Environment” in World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 5, 179-183, 2012.
  9. E. Thambiraja, G. Ramesh and Dr. R. Umarani, "A Survey on Various Most Common Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 226-233, July 2012.
  10. Pushpendra Verma, Dr. Jayant Shekhar, Preety,Amit Asthana, “A Survey for Performance Analysis Various Cryptography Techniques Digital Contents”, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.1, January- 2015, pg. 522-531
  11. Sweta K.Parnar,Prof. K.C.Dave,”A review on various most common symmetric encryption algorithm”,International journal for scientific research and development ,volume 1,issue 4,2013
  12. S.Artheeswari,Dr.RM.Chandrasekaran,“INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) FOR DATA SECURITY IN CLOUD”, International Journal of Technology and Engineering System (IJTES)
  13. Vineet Kumar Singh, Dr. Maitreyee Dutta “ANALYZING CRYPTOGRAPHIC ALGORITHMS FOR SECURE CLOUD NETWORK” International Journal of advanced studies in Computer Science and Engineering IJASCSE Volume 3, Issue 6, 2014.
  14. S C Rachana, Dr. H S Guruprasad, “Emerging Security Issues and Challenges in Cloud Computing”, International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 3, Issue 2, March 2014, and ISSN: 2319-5967.
  15. Rajdeep Bhanot and Rahul Hans,” A Review and Comparative Analysis of Various Encryption Algorithms”, International Journal of Security and Its Applications Vol. 9, No. 4 (2015), pp. 289-306
  16. M. Kumar and E. G. Dharma, “A comparative analysis of symmetric key encryption algorithm”, IJARCET, vol. 3, no. 2, (2014).
  17. Randeep Kaur, Supriya Kinger “Analysis of Security Algorithms in Cloud Computing”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 3, March 2014, ISSN 2319 – 4847.
  18. Christopher Yale Crutchfield “Security Proofs for the MD6Hash Function Mode of Operation”, Massachusetts Institute of Technology2008.
Index Terms

Computer Science
Information Sciences

Keywords

Data security Data cryptography encrption decrption and cloud.