Back
 JIS  Vol.10 No.4 , October 2019
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
Abstract: Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud.
Cite this paper: Hossain, M. , Ullah, A. , Khan, N. and Alam, M. (2019) Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing. Journal of Information Security, 10, 199-236. doi: 10.4236/jis.2019.104012.
References

[1]   Definition of Cloud Computing.
https://searchcloudcomputing.techtarget.com/definition/cloud-computing

[2]   What Is Cloud Computing.
https://searchcloudcomputing.techtarget.com/definition/cloud-computing

[3]   What Is Encryption and Decryption.
https://www.tutorialspoint.com/internet_technologies/data_encryption

[4]   What Is the Types of Encryption Technique.
https://www.zettaset.com/blog/types-of-encryption-underlying-algorithms

[5]   Selvi, S. (2017) An Efficient Hybrid Cryptography Model for Cloud Data Security. International Journal of Computer Science and Information Security, 15, 307-313.

[6]   AbdElnapi, N.M.M., Omara, F.A. and Omran, N.F. (2016) A Hybrid Hashing Security Algorithm for Data Storage on Cloud Computing. International Journal of Computer Science and Information Security, 14, 175-181.

[7]   Arora, R. and Parashar, A. (2013) Secure User Data in Cloud Computing Using Encryption Algorithms. International Journal of Engineering Research and Applications, 3, 1922-1926.

[8]   Kartit, Z. and El Marraki, M. (2015) Applying Encryption Algorithm to Enhance Data Security in Cloud Storage. Engineering Letters, 23, 277-282.

[9]   Belguith, S., Abderrazak, J. and Attia, R. (2015) Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm. The 11th International Conference on Autonomic and Autonomous Systems, Rome, 24-29 May, 98-103.

[10]   Singh, N. and Singh, N.K. (2014) Information Security in Cloud Computing Using Encryption Techniques. International Journal of Scientific & Engineering Research, 5, 1111-1113.

[11]   Agarwal, A. and Agarwal, A. (2011) The Security Risks Associated with Cloud Computing. International Journal of Computer Applications in Engineering Sciences, 1, 257-259.

[12]   Pancholi, V.R. and Patel, B.P. (2016) Enhancement of Cloud Computing Security with Secure Data Storage Using AES. International Journal for Innovative Research in Science & Technology, 2, 18-21.

[13]   Sachdev, A. and Bhansali, M. (2013) Enhancing Cloud Computing Security Using AES Algorithm. International Journal of Computer Applications, 67, 19-23.
https://doi.org/10.5120/11422-6766

[14]   ArulJothy, K., Sivakumar, K. and Delsey, M.J. (2017) Efficient Cloud Computing with Secure Data Storage Using AES and PGP Algorithm. International Journal of Computer Science and Information Technologies, 8, 582-585.

[15]   Lee, B.-H., FaridWajdi, M. and Dewi, E.K. (2018) Data Security in Cloud Computing Using AES under HEROKU Cloud. 27th Wireless and Optical Communications Conference, Hualien, 30 April-1 May 2018.

[16]   Sathana, V. and Shanthini, J. (2014) Automated Security Providence for Dynamic Group in Cloud. International Journal of Innovative Research in CE, 2.

[17]   BhavaniBai, B. (2014) Ensuring Security at Data Level in Cloud Using Multi Cloud Architecture. International Journal of Science and Technology.

[18]   Mounica, D. and Rani, R. (2013) Optimized Multi-Clouds Using Shamir Shares. International Journal for Development of Computer Science & Technology, 1, 83-87.

[19]   Jose, N. and Kamani, C. (2013) A Data Security Model Enhancement in Cloud Environment. Journal of Computer Science and Engineering, 10, 1-6.

[20]   Delfin, S., et al. (2018) Cloud Data Security Using AES Algorithm. International Research Journal of Engineering and Technology, 5, 1189-1192.

[21]   Hash Function.pdf, n.d

[22]   Message Digest Generation Using SHA 512.
https://www.google.com/search?client=firefox-b-d&channel=trow&biw=1536&bih=750
&tbm=isch&sa=1&ei=mbZBXfvJNdHhz7sP6d-SyAM&q=message+digest+generation+using+SHA+512+&oq=message+digest+generation
+using+SHA+512+&gs_l=img.3..35i39.2548.3808..4778...0.0..0.148.2391.8j14......0....1..gws-
wiz-img.zrg5K-XsXAU&ved=0ahUKEwi7-pWkv9_jAhXR8HMBHemvBDkQ4dUDCAY&uact=5#imgrc=piLEnVVNqsKcMM


[23]   Processing of a Single 1024-Bit Block in SHA 512.
https://www.google.com/search?q=Processing+of+a+single+1024-+bit+block+in+SHA+512-&client
=firefox-b-d&channel=trow&source=lnms&tbm=isch&sa=X&ved=0ahUKEwidv6a-v9_jAhV
p8XMBHfUQAToQ_AUIEigC&biw=1536&bih=750#imgrc=SUvuOD_TXhzHvM


[24]   Base64 Encoder and Decoder.
https://www.base64encode.org

[25]   Rijndeal S-Box, 2019. Wikipedia.

 
 
Top