Data encryption in public cloud using multi-phase encryption model


  • Snata Choudhury Christ University
  • V.B. Kirubanand Christ University





Cloud Computing, Cryptography Algorithm, Security Issues, Multiphase Encryption.


Cloud computing the most used word in the world of Information Technology, is creating huge differences in IT industry. Nowadays huge amount of data is being generated and the researchers are finding new ways of managing these data. Basically, the word cloud refers to a virtual database that stores huge data from various clients. There are three types of cloud public, private and hybrid. Public cloud is basically for general users where users can use cloud services free or by paying. Private cloud is for any particular organizations and hybrid one is basically combine of both. Cloud offers various kind of services such as IAAS, PAAS, SAAS where services like platform for running any application, accessing the huge storage, can use any application running under cloud are given. The cloud also has a disadvantage regarding the security for the data storage facility. Basically, the public cloud is prone to data modification, data hacking and thus the integrity and confidentiality of the data is being compromised. Here in our work the concern is to protect the data that will be stored in the public cloud by using the multi-phase encryption. The algorithm that we have proposed is a combination of Rail Fence cipher and Play Fair cipher.


[1] Shakeeba S. Khan, Prof. R. R. Tuteja, K., â€Security in Cloud Computing using Cryptographic Algorithmsâ€, International Journal of Innovative Research in Computer and Communication, Vol. 3, Issue 1, January 2015.

[2] P. Subhasri, Dr. A.P admapriya, “Multilevel Encryption for Ensuring Public Cloudâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 7, July 2013.

[3] Karun Handa, Uma Singh, “ Data Security in Cloud Computing using Encryption and Steganography “, International Journal of Computer Science and Mobile Computing, Vol. 4, Issue 5, May 2015.

[4] Treesa Maria Vincent, Mrs. J Sakunthala, “Encrypted Data Storage in Cloud Environmentâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 3, March 2013.

[5] Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou, “Authorized Private Keyword Search over Encrypted Data in Cloud Computingâ€, 31st International Conference on Distributed Computing Systems, 2011.

[6] Manisha R. Shinde and Rahul D. Taur,†Encryption Algorithm for Data Security and Privacy in Cloud Storageâ€, AJCSES [3] [1] [2015] 034-039.

[7] Aized Aim Soofi, M.Irfan Khan and fazal-e-Amin, “ Encryption Techniques for Data Confidentialityâ€, International Journal of Grid Distribution Computing, Vol. 7, No.4,2014

[8] Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challengesâ€, International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.

[9] A. Mahesh Babu, G.A. Ramachandra, M.Suresh Babu, “Implementation of Security in Cloud Systems Based using Encryption and Steganography “, International Journal of Electrical, Electronics and Computer Systems (IJEECS), ISSN (Online): 2347-2820, Volume -3, Issue-11 2015.

[10] Geethu Thomas, Prem Jose V and P.Afsar,â€Cloud computing security using encryption techniqueâ€.

[11] Maha TEBAA, Said EL HAJII, “Secure Cloud Computing through Homomorphic Encryptionâ€, International Journal of Advancements in Computing Technology (IJACT) Volume5, Number16, December 2013.

[12] Nidal M. Turab, Anas Abu Taleb Shadi R. Masadeh,†Cloud Computing Challenges and Solutionsâ€, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013.

[13] V.B Kirubanad, P.Prabu, “Cloud Computing with Mobile-Fi Technology using transposition and substitution cipher in Job Scheduling.

[14] Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Cloud Computing Cryptography "State-of-theArt", International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:7, No:8, 2013.

[15] Gurpreet Kaur, Manish Mahajan, “Analyzing Data Security for Cloud Computing Using Cryptographic Algorithmsâ€, Int. Journal of Engineering Research and Applications, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786.

View Full Article: