Study of Cloud Computing Security Methods: Cryptography

International Journal of Computer Science and Engineering
© 2019 by SSRG - IJCSE Journal
Volume 6 Issue 4
Year of Publication : 2019
Authors : Maryann Thomas, S. V. Athawale
: 10.14445/23488387/IJCSE-V6I4P101

pdf
Citation:
MLA Style:

Maryann Thomas, S. V. Athawale, "Study of Cloud Computing Security Methods: Cryptography" SSRG International Journal of Computer Science and Engineering 6.4 (2019): 1-5.

APA Style:

Maryann Thomas, S. V. Athawale,(2019). Study of Cloud Computing Security Methods: Cryptography. SSRG International Journal of Computer Science and Engineering 6(4), 1-5.

Abstract:

Data can be stored on the internet or cloud, so that clients can access their data or applications anytime and anywhere through any device connected to the Internet. This is called Cloud Computing. It provides on-demand access, and reduces the need for advanced hardware thereby making it extremely convenient for clients. With the rising popularity of cloud based services, the frequency of malicious attacks on cloud storage and data leaking is also rising. It is important to protect the user's data privacy. Thus it has become extremely crucial to ensure security in cloud storage. One of the methods to protect the data is cryptography. Cryptography is a method in which data is converted into a meaningless form so that unauthorized users cannot read it. Data can be encrypted by various algorithms. It destroys the format of the data as well as the look and feel of it , the length of data may also increase due to added padding. During decryption,the added padding is stripped off and the encrypted data is decoded so that it returns back to its original form.

References:

[1] Rishav Chatterjee, Sharmistha Roy,Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud ,Volume 7 Issue No.5 , 2017 IJESC
[2] Akashdeep Bhardwaja,GVB Subrahmanyamb, Vinay Avasthic, Hanumat Sastryd ,Security Algorithms for Cloud
Computing,Elsevier,International Conference on Computational Modeling and Security (CMS 2016)
[3] CCM website [online]: https://ccm.net/contents/134-introduction-to-encryption-with-des
[4] Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. DOI: 10.15226/2474-9257/3/2/00132
[5] ComputerHope website [online]: :https://www.computerhope.com/jargon/num/3des.htm
[6] Commonlounge website :https://www.commonlounge.com/discussion/e32fdd267aaa4 240a4464723bc74d0a5
[7] Cryptomathic website [online]: /www.cryptomathic.com/news-events/blog/3des-is-officially-being-retired
[8] Syncsort website [online]: https://blog.syncsort.com/2018/08/data-security/aes-vs-des-e ncryption-standard-3des-tdea/

Key Words:

cloud computing, data privacy, security, cryptography