An Enhanced Approach for Data Encryption in Cloud Computing

Authors(5) :-K. Priyanka, N. Priyanka, R. Sri Sruthi, S. Jeevanandham, Dr. N. Suguna

The advanced technology specifies cloud computing as a digital facility which is accessed by device over the internet. It renders setup and comfortable way of dealing a huge data essential to run an organization positively. Cloud storage technology acquires additional expansion to appeal multiple users. Information storage and processing for a telecommunication service in the cloud can be integrated as a data service in PaaS (Platform-as-a-Service) level. High-level applications interchange data with the data service. However, privacy-preserved outsourcing mechanism needs to be in an elaborate way decorated since the cloud is often not fully committed. The proposed system is developed to reduce the key generation and communication latency that also improves the communication reliability. In addition, certificate policies can be designed for high-level applications based on their protection requirements.

Authors and Affiliations

K. Priyanka
UG Scholar, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
N. Priyanka
UG Scholar, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
R. Sri Sruthi
UG Scholar, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
S. Jeevanandham
Assistant Professor, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Dr. N. Suguna
Professor, Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India

Data Encryption, cloud computing, Sobol sequence, Authentication Server, IEEE 802.11n, 802.11ac

  1. Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706.
  2. Cao N, Yang Z, Wang C, Ren K, Lou W (2011) Privacy-preserving query over encrypted graph-structured data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 393–402
  3. Khan AN, Kiah MM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299
  4. Bagirov AM, Barton A, Mala-Jetmarova H, Al Nuaimat A, Ahmed S, Sultanova N, Yearwood J (2013) An algorithm for minimization of pumping costs in water distribution systems using a novel approach to pump scheduling. Math Comput Model 57(3):873–886
  5. Ward JS, Barker A (2014) Self managing monitoring for highly elastic large-scale cloud deployments. In: Proceedings of the Sixth International Workshop on Data Intensive Distributed Computing”. DIDC ’14. ACM. pp 3–10
  6. R. Buyyaa, C.S. Yeoa, S. Venugopala, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2009)
  7. A.K. Bhateja, A. Bhateja, S. Chaudhury, P.K. Saxenaa, Cryptanalysis of Vigenere cipher using Cuckoo Search. Appl. Soft Comput. 26, 315–324 (2015)
  8. M. Zineddine, Vulnerabilities and mitigation techniques toning in the cloud, a cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Levy flights. J. Comput. Secur. 48, 1–18 (2015)
  9. L. Tawalbeh, N.S. Darwazeh, R.S. AlQassas, F. AlDosari, A secure cloud computing model based on data classification. Procedia Comput. Sci. 52, 1153–1158 (2015)
  10. V.G. Martínez, L.H. Encinas, A.Q. Dios, Security and practical considerations when implementing the elliptic curve integrated encryption scheme. J. Cryptologia 39(3), 244–269 (2015)

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2019
Date of Publication : 2019-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 73-77
Manuscript Number : SISRRJ118125
Publisher : Shauryam Research Institute

ISSN : 2581-6306

Cite This Article :

K. Priyanka, N. Priyanka, R. Sri Sruthi, S. Jeevanandham, Dr. N. Suguna, "An Enhanced Approach for Data Encryption in Cloud Computing", Shodhshauryam, International Scientific Refereed Research Journal (SHISRRJ), ISSN : 2581-6306, Volume 2, Issue 2, pp.73-77 , March-April.2019
URL : https://shisrrj.com/SISRRJ118125

Article Preview