A Review on Security Algorithms in Cloud Computing

Authors

  • Archana M  Scholar, School of Computing and Information Technology REVA University, Bangalore, Karnataka, India
  • Dr. Mallikarjuna Shastry  Professor, School of Computing and Information Technology REVA University, Bangalore, Karnataka, India

Keywords:

Cloud Computing, Security Issues, Symmetric and Asymmetric algorithms

Abstract

At present, cloud computing is the fastest growing technology in today’s world. Cloud computing is a model that provides the services based on as-needed and when-needed basis. Cloud computing provides online information storage, infrastructure and application. Many organizations shift towards cloud computing due to its benefits of less hardware maintenance and reduced expenditure start-up cost and at the same time, cloud computing offers many hazards. Network and Internet applications are growing very fast, since the need to secure these applications are very fast. For this purpose cryptography algorithms (symmetric & Asymmetric) are proposed. The use of relevant algorithm deals with the level of data safety in cloud because data security in cloud computing is a serious issue as the data centers are located worldwide. Authentication is the most essential procedure to ensure the cloud data in a secured manner. However, strong user authentication is the main requirement for cloud computing that reduces the unauthorized user access of data on cloud. Data security is a more important issue of cloud computing. Thus, the need to ensure the safety of information. Here in this survey paper, I have presented encryption based security algorithms for cloud computing.

References

  1. Kalyani Kadam, Rahul Paikrao, Ambika Pawar, "Survey on Cloud Computing Security", IJETAE, Volume 3, Issue 12, December 2013.
  2. AbhinayB. Angadi, Akshata B. Angadi, Karuna C. Gull, "Security Issues with Possible Solutions in Cloud Computing-A Survey", IJARCET, Volume 2, Issue 2, February 2013.
  3. A. N. Suresh, Ch. Sailaja, G. Gayatri, D.V.S. Deepak, "Security Challenges In Cloud Computing", IJERT, Vol. 2 Issue 2, February- 2013.
  4. Dr.Nedhal A. Al-Saiyd, Nada Sail, "Data Integrity in Cloud Computing Security", Journal of Theoretical and Applied Information Technology, 31st December 2013. Vol. 58 No.3
  5. Rushikesh Vilas Belamkar, "Challenges and Security Issues in Cloud Computing", ISRJ, ISSN 2230-7850, Volume-4, Issue-2, March-2014.
  6. RandeepKaur, SupriyaKinger.2014Analysis of Security Algorithms in Cloud Computing. International Journal of Application or Innovation in Engineering & Management 3: 171–176.
  7. SunithaSharma et al.2013Enhancing Data Security In Cloud Storage. International Journal of Advanced Research in Computer and Communication Engineering, 2: 2132–2134.
  8. Nikhitha K, Navin K S.2015A Survey On Various Encryption Techniques For Enhancing Data Security In Cloud. International Journal of Advanced Research Trends in Engineering and Technology 194– 197. 
  9. Vijendra et al.2014Data Storage Security in Cloud Environment with Encryption and Cryptographic Techniques. International Journal of Application or Innovation in Engineering & Management, 3: 209–213.
  10. CharanjeetKaur et al.2015Data Security Algorithms In Cloud Computing: A Review. International Journal For Technological Research In Engineering 2:372– 375.
  11. Jay Singh et al.2012Improving Stored Data Security In Cloud Using RC5 Algorithm. Nirma University International Conference on Engineering. pp. 1–5. 
  12. DeepikaVerma, Karan Mahajan.2014To Enhance Data Security in Cloud Computing Using Combination of Encryption Algorithms, 2: 41–44. 
  13. Nasrin K, ZurinaMohd.2014A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services. IEEE Conference on Systems, process and Control pp. 58-62. 
  14. SaiSindhuTheja R et al.2015Data Security in Cloud for Medical Sciences using AES 512-bit Algorithm. International Journal on Recent and Innovation Trends in Computing and Communication 1746– 1749.
  15. LovepreetKaur et al.2015A Survey on the Encryption Algorithms in the Cloud Security Applications. International journal of Science Technology & Management (IJSTM), pp.1– 9.
  16. Honey Patel, JasminJha.2012Securing Data in Cloud Using Homomorphic Encryption. International Journal of Science and Research. 4, :1892–1895. 
  17. Jayanthi M et al.2014Analysis on Secure Data Sharing using ELGamal‘s Cryptosystem in Cloud. International Journal of Computer Science and Electronics Engineering, 4:50–55.
  18. Raghul et al.2015Data Security in Federated Cloud Environment using Homomorphic Encryption Technique. International Journal of Emerging Technology and Advanced Engineering, 5:137–141.
  19. Sana Belguith et al.2015Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm. The Eleventh International Conference On Autonomic and Systems. 98– 103. 
  20. Tembhurne S et al.2015An Improvement In Cloud Data Security That Uses Data Mining. International Journal of Advanced Research in Computer Engineering & Technology 4: 2044– 2049.
  21. NiteenSurv et al. Framework for Client Side AES Encryption Techniques in Cloud Computing. International Advance Computing Conference (IACC), 525– 528.
  22. Pradeep Kumar et al2014An authentication approaches for data sharing in cloud environment for dynamic group. International conferences on issues and challenges in intelligent computing techniques (ICICT) 9:262–267. 
  23. Rashmi S et al.2015Architecture for Data Security in Multi-cloud Using AES-256 Encryption Algorithm. International Journal on Recent and Innovation Trends in Computing and Communication 157-161. 
  24. Masthanamma V et al.2015An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm. International Journal of Innovation Research in Science, Engineering and Technology 4: 1441– 1445.
  25. Anuj Kumar et al.2014Cloud Data Security using Authentication and Encryption Technique. International Journal of Innovative Research In Technology 1: 388– 391
  26. Prashantrewagad et al.2013Use of digital signature with Diffie Hellman key Exchange and AES encryption algorithm to enhanced data security in cloud computing. International conference on communication systems and network technologies. 3:437-439. 
  27. Sonia sindhu.2015A survey of security algorithms in cloud computing. International journal of Advanced Research in Computer Engineering & Technology,

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Archana M, Dr. Mallikarjuna Shastry, " A Review on Security Algorithms in Cloud Computing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.1490-1495, January-February-2018.