Professional Documents
Culture Documents
I. INTRODUCTION
Cloud computing technology has revolutionized
large volume of data storage and access of data from
anywhere around the world.Cloud Computing offers
services and resources are accessed and retrieved
from web. Cloud computing allows centralized data
storage and theresources, applications as utilities are
accessed through online by deploying group of
remote servers and Networks.Cloud deployments
models are categorized as Public Cloud, Private
Cloud, Hybrid Cloud and Community Cloud model.
Cloud computing defined by the National Institute of
Standards and Technology (NIST), is A model for
enabling ubiquitous, convenient, on-demandnetwork
access to a shared pool of configurable
computingresources
(e.g.,
storage,
applications,networks, servers and services) that can
be rapidly provisioned andreleased with minimal
management effort or service providerinteraction.[1]
Data which is stored in cloud can be accessed from
multiple distributed and shared resources. The
benefits of cloud storage include better accessible,
reliability, protection, backup and recovery.
Cloud Computing is widely used for number
of reasons either directly or indirectly which includes
cost reduction, Flexibility, Universal access. Cloud
computing increases the capacity in low cost without
any investments on new technology, training new
persons. Security issue is the major challenge in
Cloud Computing.As the data is sensitive
information, the data owners do not move the
information to the cloud unless confidentiality and
privacy is guaranteed.Data Query services, is an
interesting solution for scalability and cost saving
during deployment of Public cloud infrastructures [2].
In section 2 Different categories of Cloud storage
are discussed. Section3 describes Cloud services
delivery model. Section 4 Security issues in Cloud
computing. In section 5 Analysis of techniques are
1281
1282
F. RSA Algorithm
Parsi Kalpana ,et al. [8].To ensure the security of
data, they proposed a method by implementing
RSAalgorithm. Since it is a block cipher, in which
every message islinked to an integer. RSA consists of
Public-Key and Private-Key.
Public key is common key and any one can access
the key where as private key is known only to the
data owner. Once the encryption is done with public
key, then decryption is done by the user who owns
the private key. Hence the authorized person only can
access the data in the cloud environment using RSA
algorithm
G.AROcrypt Algorithm
Arockiam,et al.[9] paper proposed a new
cryptographic technique named AROcrypt to address
thesecurity problems in cloud storage. This
AROcrypt technique is provided through SEaaS
model. Encrypted data are stored on storage server
while secret keys are retained by data owner and
access to the user is granted by issuing the
corresponding decryption keys. AROcrypt technique
is based on a symmetric encryption technique. The
data are encrypted before they are forwarded to the
cloud storage. Hence, in this paper a new
confidentiality technique has been proposed and
implemented.
H.AES, Blowfish, DES, RSA Algorithm
Rachna Arora et al. [10] proposes a comparison
between AES, Blowfish, DES and RSA algorithm
with respect to time, memory requirement, encryption
time and memory size.AES algorithm uses least time
to execute cloud data. Blowfish algorithm has least
memory requirement. DES algorithm consumes least
encryption time. RSA consumes longest memory size
and encryption time.
I. ASIF Encryption Algorithm
Asif Mushtaqueet al. [11] proposes a Hybrid
approach for data security in Cloud computing. ASIF
EncryptionAlgorithm is best because it provides
better security and reduces space complexity in
comparison to related algorithms. The most important
feature of thisencryption algorithm is that it is
impossible to crack thisalgorithm without knowledge
of original key value because the internal key
generation function is based on key entered by
user.For compression the existing method is used and
to encrypt we used our own encryption algorithm.
All these existing algorithms require extra space for
encrypted data but ASIFEA does not require any
extra space.
1283
METHOD
RASP
TRSE
CP-ABE
KP-TSABE
KP-ABE
RSA
AROCrpyt
AES,Blowfish,
DES,RSA
ASIF
SCOPE
ADVANTAGES
Provide secure
and efficient
range query and
kNN query
services for
protected data.
To employ
vector space and
Homomorphic
Encryption
Information leakage
is eliminated and
data security is
ensured
Key
issuingmechanis
m that removes
key escrow
during thekey
generation.Priva
te keyscannot be
derived by
curious key
generation and
data storing
centre.
A privacy
security to be
implemented,
by using lbilinear DiffieHellman
inversion
A public key
encryption
methodis
designed for
one-to-many
communications
Enhances data
privacy and
confidentiality in the
datasharing system
To provide data
security
Intruder cant
decrypt the original
data
Symmetric
Encryption
algorithm uses
ASCII values to
process the
plain text to
cipher text
Data loss,
segregation and
privacy are
eliminated
during
accessing web
application
Maximum security
and better
performance than
DES,3DES and
Blowfish
Data
compression to
reduce the
original size
and encrypt the
data
VI. CONCLUSION
Cloud computing is recent emerged technology that
has revolutionized the storage of large volume of
data. Security issues are the major challenging issue
in Cloud computing. Various data security algorithms
are discussed in the above section. Examining the
major security challenges for cloud providers and
their clients, and this paper further is extended by
guidelines for the implementation of data security
ontrols that are based on recognized security
frameworks and industry best practices.
REFERENCES
[1]
[2]
[3]
Self-Destructing
scheme to secure
data
[4]
[5]
[6]
AES-Least
execution time,
Blowfish-least
memory
requirement,DESleast encryption time
and RSA-Consumes
longest time
[7]
[8]
[9]
[10]
[11]
[12]
[13]
Space complexity
[14]
1284