Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 16
Year of Publication: 2014
Authors:
N. Hemalatha
A. Jenis
A. Cecil Donald
L. Arockiam
10.5120/16875-6873

N Hemalatha, A Jenis, Cecil A Donald and L Arockiam. Article: A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing. International Journal of Computer Applications 96(16):1-6, June 2014. Full text available. BibTeX

@article{key:article,
	author = {N. Hemalatha and A. Jenis and A. Cecil Donald and L. Arockiam},
	title = {Article: A Comparative Analysis of Encryption Techniques and Data Security Issues in Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {16},
	pages = {1-6},
	month = {June},
	note = {Full text available}
}

Abstract

Cloud computing has been seen as the next generation architecture of IT enterprise. The cloud paradigm advantages and its potential for decreasing costs and reducing the time for a service that favours towards security issues. Cloud Computing is an aggregation of IT services that offered to the customer based on leasing. Though a large number of security issues are addressed, still some are not addressed and several algorithms are proposed for security issues. This paper presents a perspective of cloud computing technologies, essential characteristics, classifications, delivery models and various encryption mechanisms. A comparative study made on several encryption techniques are used for maintaining the confidentiality in the cloud. Finally, the major data security issues present in cloud computing are discussed.

References

  • P. Mell and T. Grance, "The NIST Definition of Cloud Computing", September 2011.
  • Anwar J. Alzaid, Eng. Jassim M. Albazzaz, "CLOUD COMPUTING: AN OVERVIEW", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 9, September 2013.
  • Donald, A. Cecil, S. Arul Oli, and L. Arockiam. "Mobile Cloud Security Issues and Challenges: A Perspective. " International Journal of Electronics and Information Technology (IJEIT), ISSN (2013): 2277-3754.
  • Maneesha Sharma, Himani Bansal, Amit Kumar Sharma, "Cloud Computing: Different Approach & Security Challenges", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
  • Sales force. Salesforce CRM applications and software solutions. http://www. salesforce. com/eu/crm/products. jsp
  • Google, Google Apps. .
  • Sarvesh Kumar, Jahangeer Ali, Ashish Bhagat, Jinendran P. K, "An Approach to Creating a Private Cloud for Universities and Security Issues in Private Cloud" International Journal of Advanced Computing, Vol. 36, Issue 1, ISSN: 2051- 0845, 2013.
  • Cecil A Donald and L Arockiam. Article: Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues. International Journal of Computer Applications 94(1):25-29, May 2014. Published by Foundation of Computer Science, New York, USA.
  • Microsoft. Microsoft Windows Azure. .
  • Amazon. Amazon Elastic Compute Cloud (EC2). .
  • Padmapriya and Subhasri,"Cloud Computing: Security Challenges & Encryption Practices", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, ISSN: 2277 128X, March 2013.
  • C. Gentry, "Computing Arbitrary Functions of Encrypted Data", ACM, Vol. 53, Issue 3, March 2010, pp. 97-105.
  • Padmapriya, Subhasri," Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Security", International Journal of Engineering Trends and Technology (IJETT), Volume 4, Issue 4, 2013.
  • V. U. K. Sastry, N. Ravi Shankar and S. Durga Bhavani, "A Generalized Playfair Cipher involving Intertwining, Interweaving and Iteration", International Journal of Network and Mobile Technologies, pp 45-53, 2010.
  • Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI "Homomorphic Encryption Applied to the Cloud Computing Security" Proceedings of the World Congress on Engineering, London, U. K. ISBN: 978-988-19251-3-8 ISSN: 2078-0958 (Print); ISSN: 2078-0966 (Online), Vol 1, July 4 - 6, 2012.
  • Huda Elmogazy, Omaima Bamasak," Towards Healthcare Data Security in Cloud Computing", IEEE 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).
  • Sugumaran, BalaMurugan. B, D. Kamalraj," An Architecture for Data Security in Cloud Computing", IEEE World Congress on Computing and Communication Technologies 2014.
  • Prashant Rewagad, Yogita Pawar," Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing", 2013 IEEE International Conference on Communication Systems and Network Technologies.
  • Neha Jain and Gurpreet Kaur," Implementing DES Algorithm in Cloud for Data Security"VSRD-IJCSIT, Vol. 2 (4), 2012, 316-321.
  • L. Arockiam, S. Monikandan," Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm", International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013.
  • Xiaojun Y, Qiaoyan Wen," A View about Cloud Data Security from Data Life Cycle", IEEE 2010.
  • Parsi Kalpana and Sudha Singaraju, "Data Security in Cloud Computing using RSA Algorithm", International Journal of Research in Computer and Communication technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.