CFP last date
20 May 2024
Reseach Article

Enhancing Cloud Computing Security using AES Algorithm

by Abha Sachdev, Mohit Bhansali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 9
Year of Publication: 2013
Authors: Abha Sachdev, Mohit Bhansali
10.5120/11422-6766

Abha Sachdev, Mohit Bhansali . Enhancing Cloud Computing Security using AES Algorithm. International Journal of Computer Applications. 67, 9 ( April 2013), 19-23. DOI=10.5120/11422-6766

@article{ 10.5120/11422-6766,
author = { Abha Sachdev, Mohit Bhansali },
title = { Enhancing Cloud Computing Security using AES Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 9 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number9/11422-6766/ },
doi = { 10.5120/11422-6766 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:12.976992+05:30
%A Abha Sachdev
%A Mohit Bhansali
%T Enhancing Cloud Computing Security using AES Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 9
%P 19-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the tremendous growth of sensitive information on cloud, cloud security is getting more important than even before. The cloud data and services reside in massively scalable data centers and can be accessed everywhere. The growth of the cloud users has unfortunately been accompanied with a growth in malicious activity in the cloud. More and more vulnerabilities are discovered, and nearly every day, new security advisories are published. Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. The future of cloud, especially in expanding the range of applications, involves a much deeper degree of privacy, and authentication. We propose a simple data protection model where data is encrypted using Advanced Encryption Standard (AES) before it is launched in the cloud, thus ensuring data confidentiality and security.

References
  1. Ellen Messmer (2012). Gartner: Growth in Cloud Computing to shape 2013 security trends, Network World [Online]. Available: http://www. networkworld. com/news/2012/120612-gartner-cloud-security-264873. html
  2. Sachdev Abha Thakral, and Mohit Bhansali. "Addressing the Cloud Computing Security Menace. " IJRET, Volume 2, Issue 2, pp. 126-130, Feb 2013.
  3. Chen, Yao, and Radu Sion. "On securing untrusted clouds with cryptography. "Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. ACM, 2010.
  4. Talbot, David (2009). "How Secure Is Cloud Computing?" Technology Review [Online]. Available: http://www. technologyreview. com/computing/23951/
  5. Agudo, Isaac and Nuez, David and Giammatteo, Gabriele and Rizomiliotis, Panagiotis and Lambrinoudakis, Costas. Cryptography Goes to the Cloud. In Lee, Changhoon and Seigneur, Jean-Marc and Park, James J. and Wagner, Roland R. , editors, Secure and Trust Computing, Data Management, and Applications, pages 190–197, Springer Berlin Heidelberg, 2011.
  6. Op-ed: Encryption, not restriction, is the key to safe cloud computing. Available Online: http://www. nextgov. com/cloud-computing/2012/10/op-ed-encryption-not-restriction-key-safe-cloud-computing/58608/
  7. "Cloud Security and Privacy", Tim Mather, Subra Kumaraswamy, and Shahed Latif – O'Reilly Book.
  8. Elminaam, Diaa Salama Abdul, Hatem Mohamed Abdul Kader, and Mohie Mohamed Hadhoud. "Performance Evaluation of Symmetric Encryption Algorithms. " IJCSNS International Journal of Computer Science and Network Security 8. 12 (2008): 280-286.
  9. Sanchez-Avila, C. , and R. Sanchez-Reillol. "The Rijndael block cipher (AES proposal): a comparison with DES. " Security Technology, 2001 IEEE 35th International Carnahan Conference on. IEEE, 2001.
  10. NIST, FIPS PUB 197, "Advanced Encryption Standard (AES)," November 2001 [Online]. Available: http://csrc. nist. gov/publications/fips/fips197/fips-197. pdf.
  11. Enterprise and Individual Users to fuel Growth in Cloud Computing [Online]. Available: http://www. redorbit. com/news/technology/1112692915/cloud-computing-growth-paas-saas-091212/
  12. Worldwide and Regional Public IT Cloud Services 2012-2016 Forecast [Online]. Available: http://www. idc. com/getdoc. jsp?containerId=236552
  13. John Harauz, Lori M. Kaufman and Bruce Potter, ?Data security in the world of cloud computing ?, 2009 IEEE CO Published by the IEEE Computer and Reliability Societies.
  14. Jensen, Meiko, et al. "On technical security issues in cloud computing. " Cloud Computing, 2009. CLOUD'09. IEEE International Conference on. IEEE, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Security Cryptography AES