Skip to main content

Applying Encryption Algorithm for Data Security in Cloud Storage

  • Conference paper
  • First Online:
Advances in Ubiquitous Networking (UNet 2015)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 366))

Included in the following conference series:

Abstract

This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kolodner, E.K., Tal, S., Kyriazis, D., et al.: A cloud environment for data-intensive storage services. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), pp. 357–366. IEEE (2011)

    Google Scholar 

  2. Arora, P., Wadhawan, R.C., Ahuja, E.S.P.: Cloud Computing Security Issues in Infrastructure as a Service. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(1) (2012)

    Google Scholar 

  3. Kumar, M.D.K., Rao, G.V., Rao, G.S.: Cloud Computing: An Analysis of Its Challenges & Cloud Computing: An Analysis of Its Challenges & Security Issues

    Google Scholar 

  4. Mehta, N., Gupta, V. K.: A survey on use of SaaS of cloud in education. In: International Conference on Cloud, Big Data and Trust (2013)

    Google Scholar 

  5. Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: 39th International Conference on Parallel Processing Workshops (2010)

    Google Scholar 

  6. Bezemer, C.-P., Zaidman, A., Platzbeecker, B., et al.: Enabling multi-tenancy: an industrial experience report. In: 2010 IEEE International Conference on Software Maintenance (ICSM), pp. 1–8. IEEE (2010)

    Google Scholar 

  7. Kamal Idrissi, H., Kartit, A., El Marraki, M.: Foremost security apprehensions in cloud computing. Journal of Theoretical and Applied Information Technology 59(3), January 31, 2014

    Google Scholar 

  8. Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN) 3(5) (2011)

    Google Scholar 

  9. Gong, C., Liu, J., Zhang, Q., Chen, H., Gongng, H.: The characteristics of cloud computing. In: 2010 39th International Conference on Parallel Processing Workshopse Brazilian Computer Society (2010)

    Google Scholar 

  10. A Platform Computing Whitepaper. Enterprise Cloud Computing: Transforming IT. Platform Computing, p. 6 (2010)

    Google Scholar 

  11. Arockiam, L., Monikandan, S.: Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm. International Journal of Advanced Research in Computer and Communication Engineering 2(8), August 2013

    Google Scholar 

  12. http://en.wikipedia.org/wiki/AES_implementations

  13. Wang, C., Wang, Q., Ren, K.: Ensuring Data Storage Security in Cloud Computing. IEEE (2009). 978-1-4244-3876-1

    Google Scholar 

  14. Liu, Q., Wang, G., Wu, J.: Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications 35(3), 927–933 (2012)

    Article  Google Scholar 

  15. Nagendra, M., Sekhar, M.C.: Performance Improvement of Advanced Encryption Algorithm using Parallel Imputation. International Journal of Software Engineering and Its Applications 8(2), 287–296 (2014)

    Google Scholar 

  16. Zhang, X., Wu, N., Yan, G., et al.: Hardware Implementation of Compact AES S-box. IAENG International Journal of Computer Science 42(2) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zaid Kartit .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kartit, Z. et al. (2016). Applying Encryption Algorithm for Data Security in Cloud Storage. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-287-990-5_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-287-989-9

  • Online ISBN: 978-981-287-990-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics