Data encryption in public cloud using multi-phase encryption model

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud computing the most used word in the world of Information Technology, is creating huge differences in IT industry. Nowadays huge amount of data is being generated and the researchers are finding new ways of managing these data. Basically, the word cloud refers to a virtual database that stores huge data from various clients. There are three types of cloud public, private and hybrid. Public cloud is basically for general users where users can use cloud services free or by paying. Private cloud is for any particular organizations and hybrid one is basically combine of both. Cloud offers various kind of services such as IAAS, PAAS, SAAS where services like platform for running any application, accessing the huge storage, can use any application running under cloud are given. The cloud also has a disadvantage regarding the security for the data storage facility. Basically, the public cloud is prone to data modification, data hacking and thus the integrity and confidentiality of the data is being compromised. Here in our work the concern is to protect the data that will be stored in the public cloud by using the multi-phase encryption. The algorithm that we have proposed is a combination of Rail Fence cipher and Play Fair cipher.


  • Keywords


    Cloud Computing; Cryptography Algorithm; Security Issues; Multiphase Encryption.

  • References


      [1] Shakeeba S. Khan, Prof. R. R. Tuteja, K., ”Security in Cloud Computing using Cryptographic Algorithms”, International Journal of Innovative Research in Computer and Communication, Vol. 3, Issue 1, January 2015.

      [2] P. Subhasri, Dr. A.P admapriya, “Multilevel Encryption for Ensuring Public Cloud”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 7, July 2013.

      [3] Karun Handa, Uma Singh, “ Data Security in Cloud Computing using Encryption and Steganography “, International Journal of Computer Science and Mobile Computing, Vol. 4, Issue 5, May 2015.

      [4] Treesa Maria Vincent, Mrs. J Sakunthala, “Encrypted Data Storage in Cloud Environment”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 3, March 2013.

      [5] Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou, “Authorized Private Keyword Search over Encrypted Data in Cloud Computing”, 31st International Conference on Distributed Computing Systems, 2011. https://doi.org/10.1109/ICDCS.2011.55.

      [6] Manisha R. Shinde and Rahul D. Taur,” Encryption Algorithm for Data Security and Privacy in Cloud Storage”, AJCSES [3] [1] [2015] 034-039.

      [7] Aized Aim Soofi, M.Irfan Khan and fazal-e-Amin, “ Encryption Techniques for Data Confidentiality”, International Journal of Grid Distribution Computing, Vol. 7, No.4,2014

      [8] Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”, International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.

      [9] A. Mahesh Babu, G.A. Ramachandra, M.Suresh Babu, “Implementation of Security in Cloud Systems Based using Encryption and Steganography “, International Journal of Electrical, Electronics and Computer Systems (IJEECS), ISSN (Online): 2347-2820, Volume -3, Issue-11 2015.

      [10] Geethu Thomas, Prem Jose V and P.Afsar,”Cloud computing security using encryption technique”.

      [11] Maha TEBAA, Said EL HAJII, “Secure Cloud Computing through Homomorphic Encryption”, International Journal of Advancements in Computing Technology (IJACT) Volume5, Number16, December 2013.

      [12] Nidal M. Turab, Anas Abu Taleb Shadi R. Masadeh,” Cloud Computing Challenges and Solutions”, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013.

      [13] V.B Kirubanad, P.Prabu, “Cloud Computing with Mobile-Fi Technology using transposition and substitution cipher in Job Scheduling.

      [14] Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Cloud Computing Cryptography "State-of-theArt", International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:7, No:8, 2013.

      [15] Gurpreet Kaur, Manish Mahajan, “Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms”, Int. Journal of Engineering Research and Applications, Vol. 3, Issue 5, Sep-Oct 2013, pp.782-786.


 

View

Download

Article ID: 9309
 
DOI: 10.14419/ijet.v7i1.9309




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.