Open Access   Article Go Back

Securing Data Transmission in Cloud using Encryption Algorithms

Anjali Nigam1 , Vineet Singh2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-6 , Page no. 21-25, Jun-2016

Online published on Jul 01, 2016

Copyright © Anjali Nigam, Vineet Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anjali Nigam, Vineet Singh, “Securing Data Transmission in Cloud using Encryption Algorithms,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.21-25, 2016.

MLA Style Citation: Anjali Nigam, Vineet Singh "Securing Data Transmission in Cloud using Encryption Algorithms." International Journal of Computer Sciences and Engineering 4.6 (2016): 21-25.

APA Style Citation: Anjali Nigam, Vineet Singh, (2016). Securing Data Transmission in Cloud using Encryption Algorithms. International Journal of Computer Sciences and Engineering, 4(6), 21-25.

BibTex Style Citation:
@article{Nigam_2016,
author = {Anjali Nigam, Vineet Singh},
title = {Securing Data Transmission in Cloud using Encryption Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {6},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {21-25},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=960},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=960
TI - Securing Data Transmission in Cloud using Encryption Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - Anjali Nigam, Vineet Singh
PY - 2016
DA - 2016/07/01
PB - IJCSE, Indore, INDIA
SP - 21-25
IS - 6
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1901 1609 downloads 1436 downloads
  
  
           

Abstract

Cloud computing provides an overwhelmingly versatile and flexible processing to associations that is accessible on interest. It lets enterprises to be fast, adaptable and ready to react quickly to the dynamic business situations. As cloud computing offers many advantages, it also has numerous security issues. The quantity of information exchanged over cloud is quite unsafe. The encryption specifications such as AES (Advanced Encryption Scheme), DES (Data Encryption Scheme), and 3DES (Triple Data Encryption Scheme) are widely used to solve such issues. But with the advancement in tools, these algorithms do not seem to be speedy and secure enough. In this paper we propose an encryption technique using two symmetric cryptography algorithms which supplies security to both the original file and the secret pass-code. The message to be sent is encrypted and decrypted using the AES algorithm. 3DES is used for encrypting and decrypting the secret key which encrypts the actual data to be transmitted.

Key-Words / Index Term

AES; 3DES; Cloud Security; Data Transmission; Encryption; Decryption.

References

[1] Zaigham Mahmood, “Data Location and Security Issues in Cloud Computing”, International Conference on Emerging Intelligent Data and Web Technologies, ISBN: 978-0-7695-4456-4, October 2011.
[2] Anjali Nigam and Vineet Singh, ‘A Study on Data Transmission Security Threats in Cloud’, International Journal of Innovative Research in Computer and Communication Engineering, ISSN (Print): 2320-9798, Volume 4, Issue 5, May 2016.
[3] Sadiya Shakil and Vineet Singh, ‘Security of Personal Data on Internet of Things using Cryptographic Algorithm’, International Journal of Engineering Science and Computing, ISSN: 2321-3361, Volume 6, Issue 4, April 2016.
[4] Mr. Gurjeevan Singh, Mr. Ashwani Singla and Mr. K S Sandha, ‘Cryptography Algorithm Comparison for Security Enhancement in Wireless Intrusion Detection System’, International Journal of Multidisciplinary Research, pp. 143-151, Volume 1, Issue 4, August 2011.
[5] Akash Kumar Mandal, Chandra Parakash and Mrs. Archana Tiwari, ‘Performance Evaluation of Cryptographic Algorithms: DES and AES’, Conference on Electrical, Electronics and Computer Science, ISBN: 978-1-4673-1516-6, Page No. (1-5), March 1-2, 2012.
[6] Supriya and Gurpreet Singh, ‘A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security’, International Journal of Computer Applications (pp. 0975-8887), Volume 67, Issue 19, April 2013.
[7] Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, ‘Enhanced Secure Algorithm For Message Communication’, International Journal of Network Security & Its Applications, Volume 3, No. 5, Sep 2011.
[8] Georgiana Mateescu and Marius Vladescu, ‘A Hybrid Approach of System Security for Small and Medium Enterprises: combining different Cryptography techniques’, Proceedings of the Federated Conference on Computer Science and Information Systems, pp. 659–662, 2013.
[9] Shadma Fazal and B.P.S. Sengar, ‘Data Transmission Security Technique Using Encryption/Decryption and Steganographic Algorithms’, International Journal of Advanced Technology & Engineering Research, ISSN No: 2250-3536, Volume 4, Issue 4, July 2014.
[10] Mahavir Jain and Arpit Agarwal. ‘Implementation Of Hybrid Cryptography Algorithm’, International Journal Of Core Engineering & Management (IJCEM), ISSN: 2348 9510, Volume 1, Issue 3, June 2014.
[11] Nagendra Kumar, Ashok Verma and Ajay Lala, ‘Access, Identity and Secure Data Storage in Private Cloud using Digital Signature’, International Journal of Innovative Research in Computer and Communication Engineering, ISSN (Print): 2320-9798, Volume 2, Issue 3, March 2014.
[12] Prof. S. N. Ghosh, Deepak T. Biradar, Ganesh C. Shinde, Sarika D. Bhojane and Manojkumar R. Shirapure, ‘Performance Analysis of AES, DES, RSA And AES-DES-RSA Hybrid Algorithm for Data Security’, International Journal of Innovative and Emerging Research in Engineering, ISSN: 2394-5494, Volume 2, Issue 5, May 2015.
[13] Aayasha Kausar and Deepty Dubey, ‘Secure Data Transmission by Combining Genetic Algorithm and Steganography Techniques with Visual Cryptography Technique’, International Journal of Innovative Research in Computer and Communication Engineering, ISSN (Print): 2320-9798, Volume 3, Issue 11, November 2015.
[14] Rachna Jain, Sushila Madan and Bindu Garg, ‘Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment’, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, Volume 3, Issue 1, January 2015.