Full Paper View Go Back
Jignesh Patel1 , Foram Suthar2 , Samrat.V.O.Khanna 3
Section:Survey Paper, Product Type: Journal
Vol.7 ,
Issue.2 , pp.21-25, Apr-2019
Online published on Apr 30, 2019
Copyright © Jignesh Patel, Foram Suthar, Samrat.V.O.Khanna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Jignesh Patel, Foram Suthar, Samrat.V.O.Khanna, “A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IOT (Internet of Things) based Smart cloud storage System: A Survey,” International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.2, pp.21-25, 2019.
MLA Style Citation: Jignesh Patel, Foram Suthar, Samrat.V.O.Khanna "A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IOT (Internet of Things) based Smart cloud storage System: A Survey." International Journal of Scientific Research in Network Security and Communication 7.2 (2019): 21-25.
APA Style Citation: Jignesh Patel, Foram Suthar, Samrat.V.O.Khanna, (2019). A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IOT (Internet of Things) based Smart cloud storage System: A Survey. International Journal of Scientific Research in Network Security and Communication, 7(2), 21-25.
BibTex Style Citation:
@article{Patel_2019,
author = { Jignesh Patel, Foram Suthar, Samrat.V.O.Khanna},
title = {A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IOT (Internet of Things) based Smart cloud storage System: A Survey},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2019},
volume = {7},
Issue = {2},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {21-25},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=363},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=363
TI - A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IOT (Internet of Things) based Smart cloud storage System: A Survey
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Jignesh Patel, Foram Suthar, Samrat.V.O.Khanna
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 21-25
IS - 2
VL - 7
SN - 2347-2693
ER -
Abstract :
Cloud computing is an era of computing to increase the capacity of computing power dynamically without more investing in new infrastructure. It is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large amount of data in its server storage system. Since the data is stored for a long term over the internet in cloud storage system it does not provide the data confidentiality and make the hackers to steal the data from storage system and even when data transition in cloud environment, With the arrival of 4G technologies and the development of 5G technologies, the mobile and wireless devices have changed people’s life. A large numbers of mobile applications produce massive sensitive data such as health, space, defense and location information in IOT based cloud computing system. Data Security in cloud is main issues of this technology. There are many methods to overcome this issue but it can’t give 100% surety about security. Data encryption is one important method to improve security of data in cloud environment. So we have briefly discusses some of the existing cryptographic algorithm approaches that help us to improve the data security in cloud environment. Before outsourcing the data from client to server, it is encrypted by encryption algorithms at client side then it will store in data server in encrypted form for security purpose. There are various encryption algorithms used to encrypt data in cloud storage system.
Key-Words / Index Term :
Cloud computing, Encryption, Decryption, AES, DES, RSA, Security, IOT
References :
[1]. Jignesh Patel, Om Mehta, Roshni Patel-“Theoretical Survey on Research Areas in Cloud Computing Research Issues in Cloud Computing” IJRERE, Volume 2, Issue 2 Feb2015
[2]. Hanbing yao, Nana xing, Junwei zhou,Zhe xia, “secure index for resource-constraint mobile devices in cloud computing”, 2169-3536 2016 ieee./ volume 4,2016.
[3]. Guicheng Shen and Bingwu Liu, ”The visions, technologies, applications and security issues of Internet of Things,” in E -Business and E -Government (ICEE), 2011, pp. 1-4
[4]. R.Kirubakaramoorthi*, D. Arivazhagan and D. Helen “Survey on Encryption Techniques used to Secure Cloud Storage System” 0974-5645 IJST Vol 8, December 2015
[5]. Yogita Verma and Neerja Dharmale,” A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard”,International Journal of Science and Research (IJSR) 2013.
[6]. Gaurav Jain, Vikas sejwar,” A Survey On Security Using Encryption Techniques In Cloud” 2321-9939 Volume 5, Issue 2 IJEDR 2017.
[7]. Evgeny Milanov, “The RSA Algorithm”, 3 June 2009
[8]. M. Gobi and R. Sridevi, “An Approach for Secure Data Storage in Cloud Environment”, International Journal of Computer and Communication Engineering, Vol. 2, No. 2, March 2013.
[9]. Rashmi Singha,Isha Panchbhaiyaa ,Abhishek Pandeya & R H Goudar ,“Hybrid Encryption Scheme (HES): An Approach for Transmitting Secure Data over Internet”, International Conference on Intelligent Computing, Communication & Convergence (ICCC-2014),Elsevier.
[10]. Viney Pal Bansal, Sandeep Singh, “A Hybrid Data Encryption Technique using RSA and Blowfish for (CC)on FPGAs”, 978-1-4673-8253-3/15/©2015IEEE.
[11]. Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang, Zhang, Athanasios V. Vasilakos, Jian Shen, “Cloud data integrity checking with an identity-based auditing mechanism from RSA”, S0167-739X(16)30016-4/January 15, 2016.
[12]. Syed rizvi, Katie cover, Christopher gates, “A trusted third party(TTP) based encryption scheme for ensuring data confidentiality in cloud environment”, Procedia Computer Science 36 ( 2014 ) 381 – 386, Elsevier.
[13]. J. Taeho, L. Xiang-Yang, W. Zhiguo and W. Meng, “Privacy preserving cloud data access with multi-authorities”, Paper presented at the INFOCOM, 2013 Proceedings IEEE.
[14]. Peidong Sha , Zhixiang Zhu, “The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing”, 978-1-5090-1256-5/16/2016 IEEE.
[15]. Mr.V.Biksham, Dr. D.Vasumathi, “Query based computations on encrypted data through homomorphic encryption in (CC)security”, 978-1-4673-9939-5/16©2016 IEEE.
[16]. Yogita Verma and Neerja Dharmale,” A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard”,International Journal of Science and Research (IJSR) 2013.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.