A Comparative Study of Encryption Security for Cloud Computing

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-61 Number-2
Year of Publication : 2018
Authors : Y. M. Wazery, E. Anwar
DOI :  10.14445/22312803/IJCTT-V61P111

MLA

MLA Style: Y. M. Wazery, E. Anwar "A Comparative Study of Encryption Security for Cloud Computing" International Journal of Computer Trends and Technology 61.2 (2018): 58-63.

APA Style:Y. M. Wazery, E. Anwar (2018). A Comparative Study of Encryption Security for Cloud Computing. International Journal of Computer Trends and Technology, 61(2), 58-63.

Abstract
Cloud computing plays an important role nowadays. The migration from on premises infrastructure to cloud computing systems takes a huge amount of interest and research. Cloud computing is a new popular, out- of- the way environment for storing and retrieving data from different place, one of the most significant areas of research in cloud computing is securing the environment.It became to be difficult to keep information because of absence of solid information encryption system;Security via encryption of messages could solve some of the important problemsabout to cloud computing systems.

Reference
[1] Enhancing security in cloud computing using public key cryptography with matrices by Birendra Goswami and Dr.S.N.Singh.
[2] Cloud data security using encryption technique by Sanjoli Singla and Jasmeat Singh.
[3] Enhancing security in cloud computing structure by hybrid encryption by Aparjita Sidhu and Rajiv Mahajan.
[4] New Comparative Study Between DES, 3DES and AES within Nine Factors byHamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani .
[5] Comparative Study of Symmetric and Asymmetric Cryptography Techniques by Ritu Tripathi1, Sanjay Agrawal2.
[6] A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing by Prasanna B T and C B Akki.
[7] A comparative study of applying real-time encryption in cloud computing environments by Faraz Fatemi Moghaddam, Omidrezakarimi, MaenT.Alrashdan.
[8] Hanafy, I.M., Salama, A.A., Abdelfattah, M. and Wazery, Y., 2012. Security in Mant based on Pki using fuzzy function. IOSR Journal of Computer Engineering, 6(3), pp.54-60.
[9] Hanafy, I.M., Salama, A.A., Abdelfattah, M. and Wazery, Y.M., 2013. AIS Model For Botnet Detection In MANET Using Fuzzy Function. International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), 3(1), pp.95-102.
[10] Houssein, E.H. and Wazery, Y.M., Vortex Search Topology Control Algorithm for Wireless Sensor Networks.
[11] Y.M.Wazery Survey on Wireless Sensor Network Current Security issues, INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY, Volume-6,Issue-5(Dec-16)

Keywords
cloud computing, encryption, security, AES encryption Algorithm, Rijndael encryption Algorithm, asymmetric keys, client-based service