Open Access   Article

Analysis of Security Algorithms used to secure Cloud Environment

A. Ahadha Parveen1 , P.S.S Akilashri2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 49-54, Dec-2018

Online published on Dec 31, 2018

Copyright © A. Ahadha Parveen, P.S.S Akilashri . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

Citation

IEEE Style Citation: A. Ahadha Parveen, P.S.S Akilashri, “Analysis of Security Algorithms used to secure Cloud Environment”, International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.49-54, 2018.

MLA Style Citation: A. Ahadha Parveen, P.S.S Akilashri "Analysis of Security Algorithms used to secure Cloud Environment." International Journal of Computer Sciences and Engineering 06.11 (2018): 49-54.

APA Style Citation: A. Ahadha Parveen, P.S.S Akilashri, (2018). Analysis of Security Algorithms used to secure Cloud Environment. International Journal of Computer Sciences and Engineering, 06(11), 49-54.

           

Abstract

Cloud computing is an environment that enables its users to store data in virtualized storage. Cloud provides different services to users; the prime aim of this service usage is to store data in the cloud. When the users store data in the cloud, security of the data is becoming the topmost challenge to be considered in the cloud environment. There are different approaches and techniques which are proposed to address the security of data in the cloud. This paper presents a study and review of different security algorithms that are used in the cloud to secure the cloud environment. The paper presents the comparison of security algorithms with respect to different parameters. Findings and observations obtained from the study of different security algorithms are discussed. Finally, the paper suggests some points to be considered at the time of developing security algorithms for the cloud environment.

Key-Words / Index Term

Cloud computing; security; security algorithms; cryptography techniques

References

[1] Arockiam, L., Monikandan, S. and Parthasarathy, G., Cloud computing: a survey. Int. J. Internet Comput, 1(2), pp.26-33, 2011.
[2] Peter Mell and Tim Grance, “The NIST Definition of Cloud Computing”, Technical Report-800-145, Version 15, National Institute of Standards & Technology, Gaithersburg, MD, United States, 2011.
[3] Dr. L. Arockiam, S. Monikandan, “Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm”, International
Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 8, pp 3064-3070., 2013.
[4] Dr. D.I. George Amalarethinam, H. M. Leena, “Enhanced RSA Algorithm with varying Key Sizes for Data security in Cloud”, World congress on Computing and communication Technologies (WCCCT), 978-1-5090, DOI 10.1109,pp.172-175, 2017 IEEE.
[5] Prakash Kuppuswamy, Dr. S. Nithyarekha” Enhanced Security for Cloud Storage using Linear Block Cipher Algorithm”, 978-1-4673-6618,-2015 IEEE.
[6] NiveditaShimbre, Prof.Priya Deshpande, “Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES algorithm”, International Conference on Computing Communication Control Automation, 978-1-4799-6892-3, DOI 10.1109, pp.35-39, 2015 IEEE.
[7] Samrat Kumar Dey, Md.Raihan Uddin, Kh.MohaimenulKabir, Md. Mahbubur Rahman, “Enhancing the Security of Cloud Computing: Genetic Algorithm and QR Code Approach”, 4th International Conference on Advance in Electrical Engineering 28-30 September, 978-1-5386-0869-2,pp.181-186, 2017 IEEE.
[8] G.Prabukanna, V.Vasudevan “Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud” ,International Conference on Electrical, Electronics, and Optimization Techniques(ICEEOT),978-1-4673-9939-5,pp.3688-3693,2016 IEEE.
[9] Uma Somani, Kanika Lakhani, Manish Mundra “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, International Conference on Parallel, Distributed and Grid Computing(PDGC),978-1-4244-7674,pp.211-216, 2010 IEEE.
[10] S. Suganya, P.M Durai Raj Vincent “Improving Cloud Security by Enhancing Remote Data Integrity Checking Algorithm” , International Conference on Innovation in Power and Advance Technologies[i-PACT],978-1-5090-5682,pp.1-6, 2017 IEEE.
[11] Jay Singh, Brajesh Kumar, Asha Kharti, “Improving Stored Data Security in Cloud Using Rc5 Algorithm”, 2017 IEEE.
[12] Arockiam, L., and S. Monikandan. "Efficient cloud storage confidentiality to ensure data security." In Computer Communication and Informatics (ICCCI), 2014 International Conference on, pp. 1-5. 2014, IEEE.
[13] Akanksha Bansal, Arun Agrawal, “Providing Security, Integrity and Authentication Using ECC Algorithm in cloud storage”, International Conference on Computer Communication and Informatics (ICCCI), Jan 05-07, 978-1-4673-8855, 2017 IEEE.
[14] Mr.PrashantRewagad, Ms.YogitaPawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, International Conference on Communication System and Network Technologies, 978-0-7695-4958, DOI 10.1109, pp.437-439, 2016-IEEE.
[15] Tim Mather, Subra Kumaraswamy, and Shahed Latif, ”Cloud Security and Privacy”, O’Reilly Media, Inc., chapter 4, September, pp. 61-71, 2009.