International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 7 | Year 2013 | Article Id. IJCTT-V4I7P152 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I7P152

An Implementation of Reverse Caesar cipher (RCC) Algorithm in Google Cloud using Cloud SQL


P.Subhasri, Dr.A.Padmapriya

Citation :

P.Subhasri, Dr.A.Padmapriya, "An Implementation of Reverse Caesar cipher (RCC) Algorithm in Google Cloud using Cloud SQL," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 7, pp. 2257-2262, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I7P152

Abstract

CLOUD (Common Location independent Online Utility on Demand) is a broad solution that delivers IT as a service. Data security issue with cloud computing many business organizations have dread in storing their data in Cloud. So the most challenging task of the business organization is to provide high security for their data. The main problem associated with cloud computing is data privacy, security, data stealing, etc. To ensure the security of data, we proposed a method of providing security by implementing Reverse Caesar Cipher (RCC) algorithm using cloud SQL to the data that will be stored in the third party area.

Keywords

Cloud computing, Security, cloud SQL, Google cloud, RCC algorithm.

References

[1] Booth.D,(2004).webservice http://www.w3.org:http//  
[2] Cong wang, Qian wang, and Kui ren, Wenjing Lou,”Ensuring data storage security in cloud computing” at IEEE (8-1-4244-38761/09). 
[3] Cloud computing principles, systems and applications NICK Antonopoulos http://mgitech.wordpress.com. 
[4] Cloud computing methodology, systems and applications lizhe wang, Rajiv Ranjan.http://www.unitiv.com. 
[5] C.N. Höfer and G. Karagiannis, “Cloud computing services: taxonomy and comparison”, Internet Serv Appl (2011). 
[6] Dulaney E., CompTIA Security+ Study Guide, Fourth Edition, Wiley Publishing Inc., Indiana, 2009. 
[7] F.A.Alvi, B.S.Choudary, N.Jaferry,”Review on cloud computing security issues & challenges”, iaesjournal.com, vol (2) (2012).
[8] Gartner: Seven cloud-computing security risks InfoWorld 200807-02. 
[9] Neha Jain and Gurpreet Kaur, “Implementing DES Algorithm in Cloud for Data Security “, VSRD-IJCSIT, Vol. 2 (4), 2012, 316321. 
[10] William, S., 2005. Cryptography and Network Security Principles and Practices. 4th Edn. PHI.