IMPLEMENT A NEW ENCRYPTION ALGORITHM FOR PROVIDING SECURITY IN CLOUD COMPUTING

RAVI SAVITA, SARVESH SINGH RAI, NAVDEEP KAUR SALUJA

Abstract


The Internet is becoming an increasingly vital tool in our everyday life, both professional and personal, as its users are becoming more numerous. It is not surprising that business is increasingly conducted over the Internet. Perhaps one of the most revolutionary concepts of recent years is Cloud Computing. The use of Cloud Computing is gaining popularity due to its mobility, huge availability and low cost. Many small businesses are realizing that cloud computing isn't just for large corporations. Many providers offer services that are targeted at the small business owner. Cloud computing presents unique opportunities for small businesses, giving them access to infrastructure that had traditionally only been available to much larger organizations.   Cryptography is one of the solutions which can prevent the intruders to enter into clouds for hacking information. Our paper gives solution for small scale industry. Out Solutions For Encryption at Small Scale industry, which will work on, Encryption at System Level, Password protected encryption key, disk encryption. This system design in such a way that Disk level encryption is time and space consuming


Keywords


Caesar Cipher; cloud computing; small businesses encryption; system level encryption.

Full Text:

PDF

References


REFERENCES

I. Sriram, & A. Khajeh-hosseini, “Research Agenda in Cloud Technologies,” in 1st ACM Symposium on Cloud Computing, SOCC 2010.

D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, D. Zagorodnov, "The Eucalyptus Open-Source CloudComputing System," Cluster Computing and the Grid, 2009. CCGRID

'09. 9th IEEE/ACM International Symposium on , vol., no., pp.124,131, 18-21 May 2009.

L. Youseff, M. Butrico, D. Da Silva, "Toward a Unified Ontology of Cloud Computing," Grid Computing Environments Workshop, 2008. GCE '08 , vol., no., pp.1,10, 12-16 Nov. 2008doi: 10.1109/GCE.2008.4738443.

B. Grobauer, T. Walloschek, E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE , vol.9, no.2, pp.50,57, March-April 2011 doi: 10.1109/MSP.2010.115.

R. B. Bohn, J. Messina, Liu Fang, Tong Jin, Mao Jian, "NIST Cloud Computing Reference Architecture," 2011 IEEE World Congress on Services (SERVICES), vol., no., pp.594,596, 4-9 July 2011doi: 10.1109/SERVICES.2011.105.

S. Ramgovind, M.M. Eloff, E. Smith, "The management of security in Cloud computing," Information Security for South Africa (ISSA), 2010 , vol., no., pp.1,7, 2-4 Aug. 2010 doi: 10.1109/ISSA.2010.5588290.

F. Sabahi, "Cloud computing security threats and responses," Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on , vol., no., pp.245,249, 27-29 May

,doi: 10.1109/ICCSN.2011.6014715.

E.M. Mohamed, H.S. Abdelkader, S. El-Etriby, "Enhanced data security model for cloud computing," 8th International Conference on Informatics and Systems (INFOS), 2012, vol., no., pp.CC-12,CC-17,

-16 May 2012.

S. Pearson, A. Benameur, "Privacy, Security and Trust Issues Arising from Cloud Computing," 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom),2010.

Wang Qian, Wang Cong, Ren Kui, Lou Wenjing, Li Jin, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distributed Systems, vol.22, no.5, pp.847,859, May 2011.

Shen Zhidong, Tong Qiang, "The security of cloud computing system enabled by trusted computing technology," 2nd International Conference on Signal Processing Systems (ICSPS), 2010, vol.2, no., pp.V2 11,V2- 15, 5-7 July 2010.

M.A. AlZain, E. Pardede, B. Soh, J.A. Thom, "Cloud Computing Security: From Single to Multi-clouds," 45th Hawaii International Conference on System Science (HICSS), 2012.

G. Nacira, A. Abdelaziz, “Secured net-banking by /spl theta/-Vigenerein Syverson's protocol,” Proceedings of the ACS/IEEE 2005

International Conference on Computer Systems and Applications,2005.


Refbacks

  • There are currently no refbacks.