CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Simulated Cryptography Algorithm for Enhanced Security of Cloud Data

by Susant Kumar Dash, Chidananda Panigrahy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 15
Year of Publication: 2015
Authors: Susant Kumar Dash, Chidananda Panigrahy
10.5120/19262-0953

Susant Kumar Dash, Chidananda Panigrahy . Simulated Cryptography Algorithm for Enhanced Security of Cloud Data. International Journal of Computer Applications. 109, 15 ( January 2015), 5-8. DOI=10.5120/19262-0953

@article{ 10.5120/19262-0953,
author = { Susant Kumar Dash, Chidananda Panigrahy },
title = { Simulated Cryptography Algorithm for Enhanced Security of Cloud Data },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 15 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number15/19262-0953/ },
doi = { 10.5120/19262-0953 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:44:51.185004+05:30
%A Susant Kumar Dash
%A Chidananda Panigrahy
%T Simulated Cryptography Algorithm for Enhanced Security of Cloud Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 15
%P 5-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today Service Providers are achieving ever-increasing transmission over networks due to Cloud and Web services bang. But information security of user as well as provider is a main apprehension whenever we talk about the implementation of network services. In this paper the proposed work has developed a new cryptography algorithm which is based on concept of block cipher. In this algorithm I have used logical operation like XOR and shifting operation. Experimental results illustrate that proposed algorithm is more efficient and secured than existing techniques. From the service provider's point of view, a typical simulated optimal algorithm handles various significant issues such as standard communication infrastructure, distributed network graph and language transparency. This paper shows the work in progress on this particular feature introducing a practical development, giving an outline on the subject, security management using cryptography algorithm presenting a view on further research. The proposed algorithm has the batter speed compared with the comparing encryption algorithm. However, the proposed algorithm expands encryption security by introducing the symmetric layer. The planned algorithm will be beneficial to the applications which require the same procedure of encryption and decryption. The cryptography techniques used in current research also applied in stenography applications.

References
  1. Jill-Jenn Vie, Michel Abdalla, Crypto Team, "A Leakage- Resilient Spatial Encryption scheme", August 23, 2011.
  2. Rosado DG, Gómez R, Mellado D, Fernández-Medina E (2012) Security analysis in the migration to cloud environments. Future Internet 4(2):469–487.
  3. Akavia. C. , On the power of simple branch prediction analysis, IACR Cryptography, report/ 2006.
  4. Marinos A, Briscoe G (2009) Community Cloud Computing. In: 1st International Conference on Cloud Computing (CloudCom), Beijing, China.
  5. Bishop, S. Kim, M. Okajima and P. Rämö, Multitenant Utility Computing on IBM Power Systems Running AIX, IBM Redbooks, February 2009, http://www. redbooks. ibm. com/redbooks/pdfs/sg247681. pdf
  6. Velte. They want froot loops: Why industry will continue to deliver multi-level security. In SACMAT'01, pages 145–146. SACMAT, May 2001.
  7. Li W, Ping L (2009) Trust model to enhance Security and interoperability of Cloud environment. In: Proceedings of the 1st International conference on Cloud Computing. Springer Berlin Heidelberg, Beijing, China, pp 69–79
  8. Marsha, The Center for Internet Security, Security Configuration Benchmark for VMware ESX 3. 5, December 2009, http://benchmarks. cisecurity. org/tools2/vm/CIS_VMware_ESX_Server_3. 5_Benchmark_v1. 2. 0. pdf
  9. A. Nath, S. Ghosh, M. A. Mallik; Symmetric key cryptography using random key generator, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239-244
  10. A. Nath, S. Das, A. Chakrabarti; Data Hiding and Retrieval, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010.
  11. Neal Koblitz "A Course in Number Theory and Cryptography" Second Edition Published by Springer-Verlag.
  12. By Klaus Felten "An Algorithm for Symmetric Cryptography with a wide range of scalability" published by 2nd International Workshop on Embedded Systems, Internet Programming and Industrial IT.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Cryptography Symmetric layer XOR operations and Network Security Graphs.