On Data Security and Encryption Algorithms in Cloud Environment

Article Preview

Abstract:

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1106-1111

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] NDRC and MIIT: Notice on Pilot Model for the Development and Innovation of Cloud Computing Services Work, 18 Oct, 2010. (In Chinese).

Google Scholar

[2] Hui An: Development Status and Innovation of Cloud Computing in China (PPT), P. 25 (In Chinese).

Google Scholar

[3] Peter Mell and Timothy Grance: The NIST Definition of Cloud Computing. http: /docs. ismgcorp. com/files/external/Draft-SP-800-145_cloud-definition. pdf.

DOI: 10.6028/nist.sp.800-145

Google Scholar

[4] DeYi Li: Cloud Computing Technology Development Report 2012, Chapter 2, Mission of Cloud Computing, pp.13-48 (In Chinese).

Google Scholar

[5] Puneet Jai Kaur and Sakshi Kaushal: Security Concerns in Cloud Computing, Communication in Computer and Information Science Vol. 169(2011), pp.103-112.

Google Scholar

[6] Vamsee Krishna Yarlagadda and Sriram Ramanujam: Data Security in Cloud Computing, Vol. 2(2011), pp.15-23.

Google Scholar

[7] ShuPing Chen and XianLiang Hou: DES Data Encryption/Decryption Technology in Computer Network, Modern Electronic Technology, Vol. 9(2005), pp.114-115(In Chinese).

Google Scholar

[8] Marie A. Wright: The evolution of the Advanced Encryption Standard, Network Security, Vol. 11(1999), pp.11-14.

Google Scholar

[9] James Nechvatal, Elaine Barker and Lawrence Bassham: Report on the Development of the Advanced Encryption Standard (AES), NIST, October 2, 2000, p.21.

Google Scholar

[10] Ming Xing He and Lin Hao: Implementation of the Advanced Encryption Standard (AES), Computer Employment Research, Vol. 12(2002), pp.16-36(In Chinese).

Google Scholar

[11] Hong Xu and GangQiang Tang: Data Security and Encrypting Arthmetic, Technological Development of Enterprise, Vol. 25(2006), pp.16-18(In Chinese).

Google Scholar

[12] Vanstone Scott: A ECC system—The Answer to Strong, Fast Public-Key Cryptography for Securing Constrained Environment, Information Security Technical Report, Vol. 2(1997), pp.78-87.

DOI: 10.1016/s1363-4127(97)81331-3

Google Scholar

[13] Zhen Song: Cryptography (China WaterPower Press, Chinese 2002), pp.3-129(In Chinese).

Google Scholar

[14] Tao Sui: Discussion on DES and AES Data Encryption Algorithm, Journal of Hubei University of Education, Vol. 30: 8 (2013), pp.66-68(In Chinese).

Google Scholar

[15] XingYe Han, Gang Chen and ShiBing Zhu: A XML Encryption Solution Based on AES and RSA, Vol. 2(2005), pp.140-142(In Chinese).

Google Scholar

[16] MengMeng Wang: Big Data Encryption Algorithm Based on Data Deduplicaiton Technology (North China University of Water Resources and Electric Power, Chinese 2013).

Google Scholar