Secure Cloud using Cryptography
Keywords:
security, Cryptography, RSA, AES, DES, CIA Encryption and Decryption etcAbstract
Cloud Computing is careful as the on-demand obtainability of computer
system incomes. The cloud Computing provides data storage and
effective computing power, it don’t need direct active management
by the user. It is blend of number of diverse machineries .this new
technology has many advantages including decrease in cost and load.
Large volume of structured and unstructured data requires increased
processing power and storage. The cloud gives not just promptly
accessible framework just as the capacity to scale this foundation
rapidly so we can oversee enormous spike in rush hour gridlock or use.
As the need of distributed computing for information stockpiling on
cloud is expanding, the need of security and classification is additionally
turning out to be basic prerequisite, so no unapproved substance can
get to the secret data. Encryption is the best answer for the security
of information. It is extremely simple to utilize. There are diverse
cryptographic calculations are accessible for encryption of information.
The cloud storage likewise defeats the disavowal of an administrations.
This paper presents the arrangements which were acquainted with
conquer the issues identified with information security and information
classification with the assistance of various cryptographic calculations
.These calculations are utilized by various association to raise the
security in cloud.
References
Saharsh, Srivastava S, Lavanya MC. Security on cloud
computing Using Cryptography.
Deshmukh A, Janda HK, Bhusari S. Security On Cloud
Using Cloud Computing. 2015 In International Journal
of Advanced Research in Computer Science and
Software Engineering.
Maitri PV, Verma A. Secure File Storage in Cloud
Computing Using Hybrid Cryptography Algorithm”.
IEEE WiSPNET 2016 conference.
Jaspher G, Katherine W. A secure framework for
enhancing user authentication in cloud environment
using Biometrics. 2017 International conference on
Signal Processing and Communication (ICSPC’17).
Jitendra Singh Adam et al. A Changed cryptographic plan
improving information. journal of Advanced Research in
Computer Science and Software Engineering, 2012; 2.
Bethencourt J, Sahai A, Waters B. Ciphertext-policy
attribute-based encryption. in proceedings of the IEEE
Symposium on Security and Privacy (SP’ 07) 2007;
-334.
Sahai A, Waters B. Fuzzy Identify-Based Encryption.
Proceedings of the EUROCRYPT, 2005: 457473.
Fan CI, Huang SM, Raun HM. Arbitrary state Attributebased encryption with dynamic membership. IEEE
Transactions on computers 63(8):1951-1961.