International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 7 | Year 2013 | Article Id. IJCTT-V4I7P136 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I7P136

Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud


Amandeep Kaur, Sarpreet Singh

Citation :

Amandeep Kaur, Sarpreet Singh, "Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 7, pp. 2170-2174, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I7P136

Abstract

Number of users stores their data on Cloud. Data storage security refers to the security of data on the storage media. So, Security is an important factor in cloud computing for ensuring clients data is placed on the secure mode in the cloud. Data must not be stolen by the third party so authentication of client becomes a mandatory task. In this paper, we proposed a new security scheme by using RSA & Twofish algorithm. In this work, both these techniques help to generate a secure key & this key is sending to user by mail service. One more feature of security is added and that is Signature. In this when user stores their data they have to enter a unique signature which will make our scheme more secure and hence the new security scheme helps to increase the security at cloud.

Keywords

Cloud Computing, Data Storage Security, RSA, Signature, Twofish, Window Azure.

References

[1] Cong Wang, Qian Wang, KuiRen and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing”, In Quality of Service, 2009. 17th International Workshop on, page 19, 2009.
[2] Balachandra Reddy Kandukuri, Rama Krishna Paturi and Dr. AtanuRakshit, “Cloud security issues” In Services Computing, 2009. IEEE  International Conference on, page 517520, 2009.
[3] J. Brodkin. Gartner: “Seven cloud-computing security risks”, Infoworld, 2008.
[4] Vamsee Krishna and Sriram Ramanujam,” Data Security in Cloud Computing”, Journal of Computer and Mathematical Sciences,vol. 2, Issue 1, 28 February, 2011. 
[5] Hassan Takabi, James B. D. Joshi and Gail-JoonAhn, “Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments” Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, p.393-398, July 19-23, 2010.
[6]Jianyong Chen, Yang Wang, and Xiaomin Wang, “On demand security Architecture for cloud computing”, 0018- 9162/12, published by the IEEE Computer society in 2012.
[7] John Harauz, Lori M. Kaufman and Bruce Potter, ”Data security in the world of cloud computing” published by the IEEE computer and reliability societies in July/August 2009.
[8]Nabendu Chaki, ”A Survey on Security issue in Cloud Computing ” in 6th International conference on Electrical Engineering/Electronics, Computer, Telecommunication and Information Technology, May 2009.
[9]Nils Gruschka and Meiko Jensen ,”Attack surface : A taxonomy for attacks on cloud services” in 2010 IEEE 3rd international conference on cloud computing.
[10] Jintao Liu,School of Electronics and Computer Science University of Southampton, “Cloud Computing Security” ,2009.
[11] Er. Rimmy Chuchra,Lovely Professional University,Phagwara, India, “Data Security in Cloud Computing”, International Journal Nov.,2012.
[12]Salvatore J. Stolfo, Melek Ben Salem, Angelos D. Keromytis, “Fog computing: Mitigating Insider data theft attacks in the cloud”.
[13] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the Clouds : A Berkeley View of Cloud Computing, 2009.
[14] A. Das and D. Grosu, “Combinatorial auction-based protocols for resource allocation in grids,” Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International, 2005.
[15] Uma Somani, KanikaLakhani, Manish Mundra,"Implementing Digital Signature with RSA EncryptionAlgorithm to Enhance the Data Security of Cloud in Cloud Computing", in 2010.