Study of Cloud Computing Security Methods: Cryptography
|International Journal of Computer Science and Engineering|
|© 2019 by SSRG - IJCSE Journal|
|Volume 6 Issue 4|
|Year of Publication : 2019|
|Authors : Maryann Thomas, S. V. Athawale|
Maryann Thomas, S. V. Athawale, "Study of Cloud Computing Security Methods: Cryptography" SSRG International Journal of Computer Science and Engineering 6.4 (2019): 1-5.
Maryann Thomas, S. V. Athawale,(2019). Study of Cloud Computing Security Methods: Cryptography. SSRG International Journal of Computer Science and Engineering 6(4), 1-5.
Data can be stored on the internet or cloud, so that clients can access their data or applications anytime and anywhere through any device connected to the Internet. This is called Cloud Computing. It provides on-demand access, and reduces the need for advanced hardware thereby making it extremely convenient for clients. With the rising popularity of cloud based services, the frequency of malicious attacks on cloud storage and data leaking is also rising. It is important to protect the user's data privacy. Thus it has become extremely crucial to ensure security in cloud storage. One of the methods to protect the data is cryptography. Cryptography is a method in which data is converted into a meaningless form so that unauthorized users cannot read it. Data can be encrypted by various algorithms. It destroys the format of the data as well as the look and feel of it , the length of data may also increase due to added padding. During decryption,the added padding is stripped off and the encrypted data is decoded so that it returns back to its original form.
 Rishav Chatterjee, Sharmistha Roy,Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud ,Volume 7 Issue No.5 , 2017 IJESC
 Akashdeep Bhardwaja,GVB Subrahmanyamb, Vinay Avasthic, Hanumat Sastryd ,Security Algorithms for Cloud
Computing,Elsevier,International Conference on Computational Modeling and Security (CMS 2016)
 CCM website [online]: https://ccm.net/contents/134-introduction-to-encryption-with-des
 Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. DOI: 10.15226/2474-9257/3/2/00132
 ComputerHope website [online]: :https://www.computerhope.com/jargon/num/3des.htm
 Commonlounge website :https://www.commonlounge.com/discussion/e32fdd267aaa4 240a4464723bc74d0a5
 Cryptomathic website [online]: /www.cryptomathic.com/news-events/blog/3des-is-officially-being-retired
 Syncsort website [online]: https://blog.syncsort.com/2018/08/data-security/aes-vs-des-e ncryption-standard-3des-tdea/
cloud computing, data privacy, security, cryptography