SECURITY AND PRIVACY ON DATA IN CLOUD COMPUTING USING AES AND RSA ENCRYPTION TECHNIQUE
Keywords:Cryptographic Algorithms, Symmetric Key Cryptography, Encryption, Decryption, RSA, AES.
Cloud computing paradigms are becoming extremely popular as a result of technical innovation and constant change. The primary goal of a cloud computing system is to give consumers pay-per-use access to on-demand processing and storage resources. It makes it affordable for small firms to use top-notch infrastructure. However, because Significant issues and obstacles for smart systems to continuously transfer generated data to the cloud computing resources, which a third-party provider maintains, including the cloud resource sharing property, data privacy and security. To address difficulties with data security, numerous encryption approaches have been developed. Cryptography is crucial for securing our data while it is being transmitted online. Text, image, audio, and video data are all made secure using cryptography. The basic objective is to keep data secure from unauthorized access while it is being sent and rendered unreadable. The role of cryptography essential function in achieving information secrecy, authenticity, integrity, and non-repudiation. Comparative examination and research of the cryptographic algorithms i.e. Advanced Encryption Standard (AES) and RSA algorithm (Rivest-Shamir-Adleman) is proposed in this work.
Arjun, U., Vinay, S.: A short review on data security and privacy issues in cloud computing.In: IEEE International Conference on Current Trends in Advanced Computing, pp. 1–5.IEEE March (2016)
Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 5.(2013)
Ankid Fadia, Jaya Bhattacharjee, “Encryption, Protecting Your Data”, Vikash Publishing House Pvt Ltd, 2007, ISBN: 812592251-2
Paul C. Kocher, "Timing Attacks on Implementations of DiffeHellman, RSA, DSS, and Other Systems", Cryptography Research Inc., San Francisco, USA.
Noha MM. AbdElnapi. “A Hybrid Hashing Security Algorithm for Data Storage on Cloud Computing”., International Journal of Computer Science and Information Security, Vol. 14 (4) , April 2016.
Zaid Kartit “Applying Encryption Algorithm for Data Security in Cloud Storage” https://www.researchgate.net/publication/301324486. ,January 2016.
Sarojini G. et.al (2016) Trusted and Reputed Services using Enhanced Mutual Trusted and Reputed Access Control Algorithm in Cloud, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016).
Rongzhi Wang,“Research on data security technology based on cloud storage” 13th Global Congress on Manufacturing and Management, GCMM 2016., Available online at www.sciencedirect.com.
Akashdeep Bhardwaj., “Security Algorithms for Cloud Computing”, International Conference on Computational Modeling and Security (CMS 2016).
Dimitra A. G. (2017) Security Policies for Cloud Computing, Available: http s:// www.dion e.li b.u nip i .gr/xmlui/bitstream/handle/unipi/11007/Georgio u_Dimitra.pdf?
Sheenal Malviya “Secure Data Sharing Scheme using Cryptographic Algorithm for Cloud Storage “International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 20 (2018) pp. 14799-14805.
Saidhbi Sheik “A Way to Secure the Data in Cloud Data Storage by Using Cloud Data Compression Mechanism” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7 Issue-4S2, December 2018.
Doaa Khudhur, “Enhancing e-banking security: using whirlpool hash function for card number encryption”, International Journal of Engineering & Technology, 7 (2.13) (2018) 281-286
P Varaprasada Rao, “Improve the Integrity of Data Using Hashing Algorithms” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-7, May, 2019.
Dr. D. Arivazhagan., “Develop Cloud Security In Cryptography Techniques Using DES-3L Algorithm Method In Cloud Computing”, International Journal Of Scientific & Technology Research Volume 9, Issue 01, January 2020.
How to Cite
Copyright (c) 2023 IEJRD
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.