Abstract
This paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.
Preview
Unable to display preview. Download preview PDF.
References
Kolodner, E.K., Tal, S., Kyriazis, D., et al.: A cloud environment for data-intensive storage services. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), pp. 357–366. IEEE (2011)
Arora, P., Wadhawan, R.C., Ahuja, E.S.P.: Cloud Computing Security Issues in Infrastructure as a Service. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(1) (2012)
Kumar, M.D.K., Rao, G.V., Rao, G.S.: Cloud Computing: An Analysis of Its Challenges & Cloud Computing: An Analysis of Its Challenges & Security Issues
Mehta, N., Gupta, V. K.: A survey on use of SaaS of cloud in education. In: International Conference on Cloud, Big Data and Trust (2013)
Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: 39th International Conference on Parallel Processing Workshops (2010)
Bezemer, C.-P., Zaidman, A., Platzbeecker, B., et al.: Enabling multi-tenancy: an industrial experience report. In: 2010 IEEE International Conference on Software Maintenance (ICSM), pp. 1–8. IEEE (2010)
Kamal Idrissi, H., Kartit, A., El Marraki, M.: Foremost security apprehensions in cloud computing. Journal of Theoretical and Applied Information Technology 59(3), January 31, 2014
Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN) 3(5) (2011)
Gong, C., Liu, J., Zhang, Q., Chen, H., Gongng, H.: The characteristics of cloud computing. In: 2010 39th International Conference on Parallel Processing Workshopse Brazilian Computer Society (2010)
A Platform Computing Whitepaper. Enterprise Cloud Computing: Transforming IT. Platform Computing, p. 6 (2010)
Arockiam, L., Monikandan, S.: Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm. International Journal of Advanced Research in Computer and Communication Engineering 2(8), August 2013
Wang, C., Wang, Q., Ren, K.: Ensuring Data Storage Security in Cloud Computing. IEEE (2009). 978-1-4244-3876-1
Liu, Q., Wang, G., Wu, J.: Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications 35(3), 927–933 (2012)
Nagendra, M., Sekhar, M.C.: Performance Improvement of Advanced Encryption Algorithm using Parallel Imputation. International Journal of Software Engineering and Its Applications 8(2), 287–296 (2014)
Zhang, X., Wu, N., Yan, G., et al.: Hardware Implementation of Compact AES S-box. IAENG International Journal of Computer Science 42(2) (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kartit, Z. et al. (2016). Applying Encryption Algorithm for Data Security in Cloud Storage. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_12
Download citation
DOI: https://doi.org/10.1007/978-981-287-990-5_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-287-989-9
Online ISBN: 978-981-287-990-5
eBook Packages: EngineeringEngineering (R0)