Cloud cryptography: a new approach with distributed storage

  • Authors

    • Rakshanda Agarwal
    • Rajeshkannan Regunathan
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.15519
  • Cloud Computing, Cryptography, Privacy, Storage, Security.
  • With the evolution of cloud computing, there is an astounding need of security solutions. Some of the primary considerations here is brought on by inappropriate warehousing of data. This particular consideration significantly enhances users' anxiousness and minimizes the adoptability of cloud computing in numerous areas, including the financial industry and governmental agencies. The most effective method to offer risk-free data transfer is via cloud cryptography and storage techniques. Considering this, we propose a new and more secure algo-rithm for the transmission of data over the cloud. In this algorithm, the data is encrypted and then split into two different parts. Each part is stored in a different cloud. This makes the data challenging for being accessed by any type of hacker, even when accessed it will be of no use to him. This will use three encryption and two decryption keys, hence a combination of symmetric and asymmetric cryptography.

     

     

  • References

    1. [1] Kumar, Shyam Nandan. "Cryptography during Data Sharing and Accessing Over Cloud." International Transaction of Electrical and Computer Engineers System 3.1 (2015): 12-18.

      [2] Van Dijk, Marten, and Ari Juels. "On the impossibility of cryptography alone for privacy-preserving cloud computing." HotSec 10 (2010): 1-8.

      [3] Gampala, Veerraju, Srilakshmi Inuganti, and Satish Muppidi. "Data security in cloud computing with elliptic curve cryptography." International Journal of Soft Computing and Engineering (IJSCE) 2.3 (2012): 138-141.

      [4] Li, Yibin, et al. "Intelligent cryptography approach for secure distributed big data storage in cloud computing." Information Sciences 387 (2017): 103-115.

      [5] http://searchcloudprovider.techtarget.com/definition/cloud-broker

      [6] Thomas, G., Jose, V., & Afsar, P. (2013). Cloud computing security using encryption technique. arXiv preprint arXiv:1310.8392.

      [7] Choudhury, T., & Kumar, P. (2016, November). Proposal and implementation of cloud security algorithm to enhance the security of the layers. In System Modeling & Advancement in Research Trends (SMART), International Conference (pp. 316-321). IEEE.

      [8] Timothy, D. P., & Santra, A. K. (2017, August). A hybrid cryptography algorithm for cloud computing security. In Microelectronic Devices, Circuits and Systems (ICMDCS), 2017 International conference on (pp. 1-5). IEEE.

      [9] Pansotra, E. A., & Singh, E. S. P. (2015). Cloud security algorithms. International Journal of Security and Its Applications, 9(10), 353-360.

      [10] Srinivas, P., & Kumar, K. R. (2013). Secure data transfer in cloud storage systems using dynamic tokens. IJRCCT, 2(1), 006-010.

      [11] Singla, Sanjoli, and Jasmeet Singh. "Implementing Cloud Data Security by Encryption using Rijndael Algorithm." Global Journal of Computer Science and Technology 13.4-B (2013): 19.

      [12] Chatterjee, R., Roy, S., & Scholar, U. G. (2017). Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud. International Journal of Engineering Science, 11818.

      [13] Bhisikar, P., & Sahu, A. (2013). Security in data storage and transmission in cloud computing. International journal of advanced research in computer science and software engineering, 3(3).

      [14] Wagh, K. S., Jathar, R., Bangar, S., & Bhakthadas, A. (2014). Securing data transfer in cloud environment. International Journal of Engineering Research and Applications, 4(5), 91-93.

      [15] https://www.garykessler.net/library/crypto.html#types.

  • Downloads

  • How to Cite

    Agarwal, R., & Regunathan, R. (2018). Cloud cryptography: a new approach with distributed storage. International Journal of Engineering & Technology, 7(2.33), 864-868. https://doi.org/10.14419/ijet.v7i2.33.15519