CFP last date
22 April 2024
Reseach Article

Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud

by Shweta Singh, Amita Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Number 12
Year of Publication: 2016
Authors: Shweta Singh, Amita Sharma
10.5120/ijca2016908606

Shweta Singh, Amita Sharma . Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud. International Journal of Computer Applications. 136, 12 ( February 2016), 12-16. DOI=10.5120/ijca2016908606

@article{ 10.5120/ijca2016908606,
author = { Shweta Singh, Amita Sharma },
title = { Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 136 },
number = { 12 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume136/number12/24204-2016908606/ },
doi = { 10.5120/ijca2016908606 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:36:53.833708+05:30
%A Shweta Singh
%A Amita Sharma
%T Analysis of EnDeCloudReports for Encrypting and Decrypting Data in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 136
%N 12
%P 12-16
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the midst of the last decades, information security has become an important issue. Encryption and decryption of data have recently been universally researched and developed as there is a need for a secure encryption and decryption which is very difficult to break. Cryptography offers main functions to meet these demands. Today, researchers have proposed several encryption and decryption algorithms such as AES, DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack of robustness and significant amount of time taken in encryption/decryption of data residing on server in cloud to maintain the security in cloud. In this paper, the cloud security enhanced by EnDeCloudReports simulator tool is analyzed on various parameters and attacks which in turn enhance the data security in Cloud by making it difficult for attacker to predicate a pattern as well as speed of the encryption / decryption scheme.

References
  1. Shweta Singh, Amita Sharma, “A Simulation Tool for Security of Hardware Resource Utilization Information in Cloud Environment with EnDeCloudReports Tool”, International Journal of Computer Applications,vol.127- No.17,pp.12-19, October 2015.
  2. Obaida Mohammad Awad Al-Hazaimeh, “A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA”, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, pp. 95-103, March 2013.
  3. Dr. Rahul Malhotra* & Prince Jain, “Study and Comparison of CloudSim Simulators in the Cloud Computing” , The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), Vol. 1, No. 4,pp. 111-115, September-October 2013.
  4. Ragheb Toemeh and Subbanagounder Arumugam, “Applying Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution Ciphers”, The International Arab Journal of Information Technology, Vol. 5, No. 1,pp. 87-91, January 2008
  5. Ilker DALKIRAN, Kenan DANIS¸MAN, “Artificial neural network based chaotic generator for cryptology”, Turk J Elec Eng & Comp Sci, Vol.18, No.2,pp. 225-240, 2010.
  6. H. Mohan, and R. Raji. "Performance Analysis of AES and MARS Encryption Algorithms". International Journal of Computer Science Issues (IJCSI), Vol. 8, issue 4. 2011.
  7. S. Xenitellis, The Open–Source PKI Book: A Guide to PKIs and Open-Source Implementations, Open CA Team, 2000.
  8. W. Emm, “Impact of Multiencryption in Data Security”, International Journal of Computer Theory and Engineering, vol. 1, pp. 571-567 , 2009.
  9. B.D.C.N.Prasad, P E S N Krishna Prasad, “A Performance Study on AES algorithms”, International Journal of Computer Science and Information Security, Vol. 8, Issue. 6,September 2010,pp 128-132.
  10. M. Anand Kumar and S.Kartikeyan, “A New 512 Bit Cipher For Secure Communication” ,I.J. Computer Network and Information Security, Vol. No.11 ,pp. 55-61, October 2012.
  11. Omer K. Jasim, Safia Abbas, “Efficiency of Modern Encryption Algorithms in Cloud Computing”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Vol.2, Issue 6, pp. 270-274, November-December 2013.
  12. Randeep Kaur, Supriya Kinger, “Analysis of Security Algorithms in Cloud Computing”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol 3, Issue 3, pp. 171 – 177, March 2014.
  13. Dr. Prerna Mahajan & Abhishek Sachdeva, “ A Study of Encryption Algorithms AES, DES and RSA for Security”, Global Journal of Computer Science and Technology Network, Web & Security, Vol 13, Issue 15, Version 1.0, pp. 15 -22, Year 2013.
  14. Salabat Khan, Armughan Ali and Mehr Yahya Durrani, “Ant-Crypto, a Cryptographer for DES”, International journal of Computer Science Issues, Vol 10, Issue 1, No 1, January 2013.
  15. Santosh Deshpande, “Symmetric Key Management : A new approach”, International Journal of Enginnering and Computer Science (IJECS), Vol 1, Issue 3, pp.125-136, Dec 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption EnDeCloudReports Cryptography Analysis Algorithms