An Implementation of Reverse Caesar cipher (RCC) Algorithm in Google Cloud using Cloud SQL

International Journal of Computer Trends and Technology (IJCTT)          
© - July Issue 2013 by IJCTT Journal
Volume-4 Issue-7                           
Year of Publication : 2013
Authors :P.Subhasri, Dr.A.Padmapriya


P.Subhasri, Dr.A.Padmapriya "An Implementation of Reverse Caesar cipher (RCC) Algorithm in Google Cloud using Cloud SQL"International Journal of Computer Trends and Technology (IJCTT),V4(7):2257-2262 July Issue 2013 .ISSN Published by Seventh Sense Research Group.

Abstract:-  — CLOUD (Common Location independent Online Utility on Demand) is a broad solution that delivers IT as a service. Data security issue with cloud computing many business organizations have dread in storing their data in Cloud. So the most challenging task of the business organization is to provide high security for their data. The main problem associated with cloud computing is data privacy, security, data stealing, etc. To ensure the security of data, we proposed a method of providing security by implementing Reverse Caesar Cipher (RCC) algorithm using cloud SQL to the data that will be stored in the third party area.


[1] Booth.D,(2004).webservice architecture .Retrived from
[2] Cong wang, Qian wang, and Kui ren, Wenjing Lou,”Ensuring data storage security in cloud computing” at IEEE (8-1-4244-3876-1/09).
[3] Cloud computing principles, systems and applications NICK Antonopoulos
[4] Cloud computing methodology, systems and applications lizhe wang, Rajiv Ranjan.
[5] C.N. Höfer and G. Karagiannis, “Cloud computing services: taxonomy and comparison”, Internet Serv Appl (2011).
[6] Dulaney E., CompTIA Security+ Study Guide, Fourth Edition, Wiley Publishing Inc., Indiana, 2009.
[7] F.A.Alvi, B.S.Choudary, N.Jaferry,”Review on cloud computing security issues & challenges”,, vol (2) (2012).
[8] Gartner: Seven cloud-computing security risks InfoWorld 2008-07-02.
[9] Neha Jain and Gurpreet Kaur, “Implementing DES Algorithm in Cloud for Data Security “, VSRD-IJCSIT, Vol. 2 (4), 2012, 316-321.
[10] William, S., 2005. Cryptography and Network Security Principles and Practices. 4th Edn. PHI.

Keywords : — Cloud computing, Security, cloud SQL, Google cloud, RCC algorithm.