CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Protection of User Data in Cloud Computing

by Abhishek Sonar, Prajwal Dubey, Vineet Iyer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 11
Year of Publication: 2020
Authors: Abhishek Sonar, Prajwal Dubey, Vineet Iyer
10.5120/ijca2020920584

Abhishek Sonar, Prajwal Dubey, Vineet Iyer . Protection of User Data in Cloud Computing. International Journal of Computer Applications. 175, 11 ( Aug 2020), 5-10. DOI=10.5120/ijca2020920584

@article{ 10.5120/ijca2020920584,
author = { Abhishek Sonar, Prajwal Dubey, Vineet Iyer },
title = { Protection of User Data in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2020 },
volume = { 175 },
number = { 11 },
month = { Aug },
year = { 2020 },
issn = { 0975-8887 },
pages = { 5-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number11/31495-2020920584/ },
doi = { 10.5120/ijca2020920584 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:24:44.749965+05:30
%A Abhishek Sonar
%A Prajwal Dubey
%A Vineet Iyer
%T Protection of User Data in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 11
%P 5-10
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There has been an increase in the development of Cloud Computing, thus there is a need for people to know how their personal information be made more secure with the assistance of upcoming technology in the field of cryptography. The problem in the older systems can be defined as although applications are often created with unique features such as data tagging; whose main motive is to prevent unauthorized access to user data, illegal access to data is still possible through some types of application vulnerability (e.g., In March 2009 there was illegal access to Google's documents and spreadsheets). Some cloud providers get their data and various applications corroborated by third-party application security tools, still, there is a need for the establishment of a process that is dedicated to only one organization. In this paper, we have given more emphasis on Symmetric key algorithms e.g., AES (which stands for advanced encryption system), DES (which stands for data encryption system), Blowfish because the information which is stored on the cloud through these algorithms is much more secure and protected as compared to an asymmetric algorithm. In this journal, we have carefully studied security issues, which are faced by many users in the process of storage or transferring data through cloud computing from one place to another. We have presented a detailed and emblematic study of how can various encryption and decryption algorithms make the overall process of communication reliable, smooth, and secure. We have also compared important distinguishing factors between algorithms like key size, scalability, the extent of security, etc.

References
  1. Lena Khanna, Anant Jaiswal, “Cloud Computing: Security Issues and Description of Encryption Based Algorithms to Overcome Them”, IJARCSSE 2013.
  2. Manoj, K. Sai, K. Mrudula, and K. phani Srinivas. "Risk Factors And Security Issues In Various Cloud Storage Operations.",IJITEE 2019.
  3. Singh, S., Maakar, S.K., and Kumar, S., 2013. A Performance analysis of DES and RSA cryptography. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 2(3).
  4. Thakur J, Kumar N. DES, AES, and Blowfish: Symmetric key cryptography algorithms simulation- based performance analysis. International journal of emerging technology and advanced engineering. 2011 Dec 12;1(2):6-12.
  5. Ertaul, Levent, Sarika Singhal, and Gökay Saldamli. "Security Challenges in Cloud Computing." In Security and Management, pp. 36-42. 2010.
  6. Rao, Ch Chakradhara, and A. V. Ramana. "Data security in cloud computing." Parameters 2, no. 04 (2016).
  7. Grover, Nidhi. "A Study of Security Threats and Issues in Cloud Computing." IITM Journal of Management and IT 5, no. 1 (2014): 78-86.
  8. S. R. Pardeshi, V. J. Pawar, and K. D. Kharat, "Enhancing information security in a cloud computing environment using cryptographic techniques," 2016 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, 2016, pp. 1- 5, doi: 10.1109/CESYS.2016.7890004.
  9. Mahajan, Prerna, and Abhishek Sachdeva. "A study of encryption algorithms AES, DES, and RSA for security." Global Journal of Computer Science and Technology (2013).
  10. T. Mantoro, Laurentinus, N. Agani, and M. A. Ayu, "Improving the security guarantees, authenticity and confidentiality in short message service of mobile applications," 2016 4th International Conference on Cyber and IT Service Management, Bandung, 2016, pp. 1-6, doi: 10.1109/CITSM.2016.7577592.
  11. Swapnil B. Khalekar. , Himesh Kishore. , Aniruddha Desai., 2014, Highly Secured Web Portal : An Illustration of Enhanced Web Security, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 03,Issue 03(March 2014).
Index Terms

Computer Science
Information Sciences

Keywords

Algorithms AES RSA 3DES Blowfish.