Cloud computing
is a kind of computing that depends on shared figuring assets instead of having
nearby servers or individual gadgets to deal with applications.Technology is moving to the cloud more and more.
It’s not just a trend, the shift away from ancient package models to package as
service has steadily gained momentum over
the last ten years. Looking forward, the following decade of cloud computing guarantees
significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing
focused on better performances, better scalability and resource consumption but
it also has some security issue with the data stored in it. The proposed
algorithm intents to come with some solutions that will reduce the security
threats and ensure far better security to the data stored in cloud.
References
[1]
Definition of Cloud Computing. https://searchcloudcomputing.techtarget.com/definition/cloud-computing
[2]
What Is Cloud Computing. https://searchcloudcomputing.techtarget.com/definition/cloud-computing
[3]
What Is Encryption and Decryption. https://www.tutorialspoint.com/internet_technologies/data_encryption
[4]
What Is the Types of Encryption Technique. https://www.zettaset.com/blog/types-of-encryption-underlying-algorithms
[5]
Selvi, S. (2017) An Efficient Hybrid Cryptography Model for Cloud Data Security. International Journal of Computer Science and Information Security, 15, 307-313.
[6]
AbdElnapi, N.M.M., Omara, F.A. and Omran, N.F. (2016) A Hybrid Hashing Security Algorithm for Data Storage on Cloud Computing. International Journal of Computer Science and Information Security, 14, 175-181.
[7]
Arora, R. and Parashar, A. (2013) Secure User Data in Cloud Computing Using Encryption Algorithms. International Journal of Engineering Research and Applications, 3, 1922-1926.
[8]
Kartit, Z. and El Marraki, M. (2015) Applying Encryption Algorithm to Enhance Data Security in Cloud Storage. Engineering Letters, 23, 277-282.
[9]
Belguith, S., Abderrazak, J. and Attia, R. (2015) Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm. The 11th International Conference on Autonomic and Autonomous Systems, Rome, 24-29 May, 98-103.
[10]
Singh, N. and Singh, N.K. (2014) Information Security in Cloud Computing Using Encryption Techniques. International Journal of Scientific & Engineering Research, 5, 1111-1113.
[11]
Agarwal, A. and Agarwal, A. (2011) The Security Risks Associated with Cloud Computing. International Journal of Computer Applications in Engineering Sciences, 1, 257-259.
[12]
Pancholi, V.R. and Patel, B.P. (2016) Enhancement of Cloud Computing Security with Secure Data Storage Using AES. International Journal for Innovative Research in Science & Technology, 2, 18-21.
[13]
Sachdev, A. and Bhansali, M. (2013) Enhancing Cloud Computing Security Using AES Algorithm. International Journal of Computer Applications, 67, 19-23. https://doi.org/10.5120/11422-6766
[14]
ArulJothy, K., Sivakumar, K. and Delsey, M.J. (2017) Efficient Cloud Computing with Secure Data Storage Using AES and PGP Algorithm. International Journal of Computer Science and Information Technologies, 8, 582-585.
[15]
Lee, B.-H., FaridWajdi, M. and Dewi, E.K. (2018) Data Security in Cloud Computing Using AES under HEROKU Cloud. 27th Wireless and Optical Communications Conference, Hualien, 30 April-1 May 2018.
[16]
Sathana, V. and Shanthini, J. (2014) Automated Security Providence for Dynamic Group in Cloud. International Journal of Innovative Research in CE, 2.
[17]
BhavaniBai, B. (2014) Ensuring Security at Data Level in Cloud Using Multi Cloud Architecture. International Journal of Science and Technology.
[18]
Mounica, D. and Rani, R. (2013) Optimized Multi-Clouds Using Shamir Shares. International Journal for Development of Computer Science & Technology, 1, 83-87.
[19]
Jose, N. and Kamani, C. (2013) A Data Security Model Enhancement in Cloud Environment. Journal of Computer Science and Engineering, 10, 1-6.
[20]
Delfin, S., et al. (2018) Cloud Data Security Using AES Algorithm. International Research Journal of Engineering and Technology, 5, 1189-1192.
[21]
Hash Function.pdf, n.d
[22]
Message Digest Generation Using SHA 512. https://www.google.com/search?client=firefox-b-d&channel=trow&biw=1536&bih=750 &tbm=isch&sa=1&ei=mbZBXfvJNdHhz7sP6d-SyAM&q=message+digest+generation+using+SHA+512+&oq=message+digest+generation +using+SHA+512+&gs_l=img.3..35i39.2548.3808..4778...0.0..0.148.2391.8j14......0....1..gws- wiz-img.zrg5K-XsXAU&ved=0ahUKEwi7-pWkv9_jAhXR8HMBHemvBDkQ4dUDCAY&uact=5#imgrc=piLEnVVNqsKcMM
[23]
Processing of a Single 1024-Bit Block in SHA 512. https://www.google.com/search?q=Processing+of+a+single+1024-+bit+block+in+SHA+512-&client =firefox-b-d&channel=trow&source=lnms&tbm=isch&sa=X&ved=0ahUKEwidv6a-v9_jAhV p8XMBHfUQAToQ_AUIEigC&biw=1536&bih=750#imgrc=SUvuOD_TXhzHvM
[24]
Base64 Encoder and Decoder. https://www.base64encode.org