CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Model to Overcome Drawbacks of Present Cloud Storage Models using AES 256 CBC Encryption

by Steve Boby George, Sanjay Jaimy, Sebin Jose, Edwin Daji, Agnel Antony
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 15
Year of Publication: 2021
Authors: Steve Boby George, Sanjay Jaimy, Sebin Jose, Edwin Daji, Agnel Antony
10.5120/ijca2021921481

Steve Boby George, Sanjay Jaimy, Sebin Jose, Edwin Daji, Agnel Antony . A Novel Model to Overcome Drawbacks of Present Cloud Storage Models using AES 256 CBC Encryption. International Journal of Computer Applications. 183, 15 ( Jul 2021), 30-35. DOI=10.5120/ijca2021921481

@article{ 10.5120/ijca2021921481,
author = { Steve Boby George, Sanjay Jaimy, Sebin Jose, Edwin Daji, Agnel Antony },
title = { A Novel Model to Overcome Drawbacks of Present Cloud Storage Models using AES 256 CBC Encryption },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2021 },
volume = { 183 },
number = { 15 },
month = { Jul },
year = { 2021 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number15/32005-2021921481/ },
doi = { 10.5120/ijca2021921481 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:16:54.938655+05:30
%A Steve Boby George
%A Sanjay Jaimy
%A Sebin Jose
%A Edwin Daji
%A Agnel Antony
%T A Novel Model to Overcome Drawbacks of Present Cloud Storage Models using AES 256 CBC Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 15
%P 30-35
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Personal data that could lead to identity theft is very common in today's world. Sensitive information like government documents, credit card information and bank account details are now stored in cloud storage services. In today's age, encrypting data has proven to be one of the most difficult operations. The purpose of this study is to implement a simple cloud storage model, which can help a user to encrypt files using AES 256 CBC and upload them to the cloud server.

References
  1. M.P Babitha and Babu K. R. R., “Secure Cloud Storage Using AES Encryption,” in International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016, pp. 859–864.
  2. R Ashalatha, M Vaidehi, “The Significance of Data Security in Cloud: A Survey on Challenges And Solutions on Data Security”, International Journal of Internet Computing, Vol, 1, Iss. 3, 2012, pp.3-10.
  3. Lee Bih-Hwang, Kusuma Dewi Ervin, Muhammad Farid Wajdi, et al. “Data Security in Cloud Computing Using AES Under HEROKU Cloud”, The 27th Wireless and Optical Communications Conference (WOCC),2018, pp.1-5.
  4. Reema, Princy, and Kumari S. et al., “Security in Cloud Computing using AES & DES,” Int. J. Recent Innov. Trends Comput. Commun., vol. 5, no. 4, pp. 194–199, 2017.
  5. Zissis D and Lekkas D, “Addressing cloud computing security issues” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–585, 2012.
  6. Dave Wallen, “AES Encryption: A Closer Look at Advanced Encryption Standards,” Security Boulevard,2020. https://securityboulevard.com/2020/05/aes-encryption-a-closer-look-at-advanced-encryption-standards/
  7. Peter Johannes Holzer, “The AES-CBC Cipher Algorithm and Its Use with IPsec”, HJP,2003.https://www.hjp.at/doc/rfc/rfc3602.html
  8. Mohit Arora, “How secure is AES against brute force attacks”, eetimes,2019. https://www.eetimes.com/how-secure-is-aes-against-brute-force-attacks/.
  9. Stallings, W. Cryptography and Network Security, 4/E. Pearson Education.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption cloud storage brute force attacks AES 256 CBC