Optimization of Cryptography Algorithms in Cloud Computing

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-46 Number-2
Year of Publication : 2017
Authors : Pooja Bindlish
DOI :  10.14445/22312803/IJCTT-V46P114

MLA

Pooja Bindlish "Optimization of Cryptography Algorithms in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V46(2):67-72, April 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Now a day, Security is becoming a main concern to maintain confidentiality and integrity of the data. For this purpose, cryptography techniques are used. Cryptography is used to encrypt the data into nonreadable format and decrypt it again into readable format when needed using specific key. Also for business perspective, cloud computing is very useful. Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because of the opportunities it is offering. It has different meaning to different uses according to their need. According to a business man, it is used to store and access the data to fulfill the memory requirement and consistency. Also secure data transmission feature of cloud computing plays a very important role in business perspective. For using cloud computing, business man has to pay specific amount of money to the cloud service provider. Cloud service provider guaranty either the confidentiality or integrity of the data. This paper proposes and implements the idea of sending already encrypted file through cloud in spite of the original file using RSA and DES algorithm of cryptography. As encrypted file is transmitted, so original file is not available even at the network. So even if any intermediate user sees the data, he will not be able to understand the data. That’s why confidentiality and integrity is maintained by this. Hence security of cloud data will be increased. This work can be enhanced using hybrid approach by integrating multiple cryptography algorithms.

References
[1] Bhaskar Parsad Rimal et al.,”A Taxonomy and Survey of Cloud Computing System”,2009 fifth international joint conference on INC,IMS and IDC.
[2] AMIT GOYAL and SARA DADIZADEH,” A Survey on Cloud Computing”
[3] Dr.Smith Jones.” AN EMPIRICAL CRYPTOGRAPHY ALGORITHM FOR CLOUD SECURITY BASED ON HASH ENCRYPTION”, International Journal of Computing and Corporate Research ISSN (Online) : 2249- 054X Volume 4 Issue 4 July 2014 International Manuscript ID : 2249054XV4I4072014-43
[4] Borko Furth, Flordia Atlantic, “Cloud computing fundamentals”, springer Ist edition, 2010, ISBN 978-1-44 19- 6523-3.
[5] Brian Hayes. `Cloud computing`. In: Commun. ACM 51.7 (2008), pp. 9-11. issn: 0001-0782. doi: http://doi.acm.org/10.1145/1364782.1364786.
[6] Charlie Kaufman and Ramanathan Venkatapathy, “Windows Azure™ Security Overview”, http://www.windowsazure.com/enus/develop/overview/
[7] A method for obtaining digital signatures and public key cryptosystems, R.Rivest, A.Shamir and L.Adleman “communication of the association for computing machinery “ 1978, pp 120-126.
[8] RSA algorithm using modified subset sum cryptosystem, Sonal Sharma, Computer and Communication Technology (ICCCT), pp-457-461, IEEE 2011.
[9] Alok Tripathi, Abhinav Mishra, “cloud computing security consideration”, 2011 IEEE International Conference on signal processing, communication and computing, 27 October2011, pp. 1-5.
[10] Joshi Ashay Mukundrao,” Enhancing Security in Cloud Computing” Information and Knowledge Management www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol 1, No.1, 2011.
[11] http://en.wikipedia.org/wiki/Cloud_computing.
[12] Atul Khate,Cryptography and network security,second edition.
[13] CRS BHARDWAJ Modibada, Jabalpur (Mp), India,” Modification Of Des Algorithm”, IJIRD, Vol 1 Issue 9, November, 2012, , pg.495 – 505.
[14] Cong Wang, Qian Wang, and Kui Ren,Wenjing Lou,” Ensuring Data Storage Security in Cloud Computing”.
[15] Overview of Cryptography by Alfred J. Menezes
[16] Shraddha Dadhich “Performance Analysis of AES and DES Cryptographic Algorithms on Windows & Ubuntu using Java” in international Journal of Computer Trends and Technology in vol.35 no. 4 in year 2016

Keywords
Cloud Computing, Cryptography, RSA, DES, Security.