Secure CRM Cloud Service using RC5 Algorithm

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2013 by IJCTT Journal
Volume-4 Issue-3                           
Year of Publication : 2013
Authors :Sachindra K. Chavan, Prof. M. L. Bangare

MLA

Sachindra K. Chavan, Prof. M. L. Bangare "Secure CRM Cloud Service using RC5 Algorithm"International Journal of Computer Trends and Technology (IJCTT),V4(3):325-330 Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -Enterprises always used organizational internal storage system for storing data. Mainly in a Customer Relational Management i.e. CRM system, the internal storage will be used for storing all the data of the customer. On the other hand, the main drawbacks in the data storage is there may be intruder’s in the administrator side and they may acquire all the information about a customer. Above threats can happen in same service provider in a cloud computing environment. To overcome with this kind of challenges in cloud computing, there is need of an innovative algorithmic approach for data security in cloud computing. A CRM (Customer Relational Management) system services is represented in this paper using RC5 algorithm. In the proposed system the party that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is responsible for encryption/decryption of the user’s data and then must delete data once encryption/decryption process is completed. In this paper the use of CRM services which demonstrates how the parties involved in secure storage and retrieval when data is saved to the cloud.

References-

[1] Jing-Jang Hwang, Hung-kaiChung, Yi-Chang Hsu, Chien-Hsing Wu, “A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service” , IEEE 2011.
[2] National Institute of Standards and Technology - Computer Security Resource Center - www.csrc.nist.gov
[3] A. Weiss, “Computing in the clouds”, networker, vol. 11, no. 4, pp. 16- 25, December 2007.
[4] C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010.
[5] M. Baker, R. Buyya, and D. Laforenza, “Grids and grid technologies for wide-area distributed computing,” International Journal of Software:Practice and Experience, vol.32, pp. 1437-1466, 2002.
[6] B. R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,”in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520, September 2009.

Keywords— Cloud Computing, CRM Service, Data Retrieval and Storage, Encryption/Decryption, RC5 algorithm, Secure Storage.