A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IOT (Internet of Things) based Smart cloud storage System: A Survey

Authors

  • Jignesh Patel Department of Computer Engineering, Indus University, Ahmadabad, Gujarat, India
  • Foram Suthar Department of Computer Engineering, Indus University, Ahmadabad, Gujarat, India
  • Samrat.V.O. Khanna IICT, Indus University, Ahmadabad, Gujarat, India

Keywords:

Cloud computing, Encryption, Decryption, AES, DES, RSA, Security, IOT

Abstract

Cloud computing is an era of computing to increase the capacity of computing power dynamically without more investing in new infrastructure. It is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large amount of data in its server storage system. Since the data is stored for a long term over the internet in cloud storage system it does not provide the data confidentiality and make the hackers to steal the data from storage system and even when data transition in cloud environment, With the arrival of 4G technologies and the development of 5G technologies, the mobile and wireless devices have changed people’s life. A large numbers of mobile applications produce massive sensitive data such as health, space, defense and location information in IOT based cloud computing system. Data Security in cloud is main issues of this technology. There are many methods to overcome this issue but it can’t give 100% surety about security. Data encryption is one important method to improve security of data in cloud environment. So we have briefly discusses some of the existing cryptographic algorithm approaches that help us to improve the data security in cloud environment. Before outsourcing the data from client to server, it is encrypted by encryption algorithms at client side then it will store in data server in encrypted form for security purpose. There are various encryption algorithms used to encrypt data in cloud storage system.

 

References

Jignesh Patel, Om Mehta, Roshni Patel-“Theoretical Survey on Research Areas in Cloud Computing Research Issues in Cloud Computing” IJRERE, Volume 2, Issue 2 Feb2015

Hanbing yao, Nana xing, Junwei zhou,Zhe xia, “secure index for resource-constraint mobile devices in cloud computing”, 2169-3536 2016 ieee./ volume 4,2016.

Guicheng Shen and Bingwu Liu, ”The visions, technologies, applications and security issues of Internet of Things,” in E -Business and E -Government (ICEE), 2011, pp. 1-4

R.Kirubakaramoorthi*, D. Arivazhagan and D. Helen “Survey on Encryption Techniques used to Secure Cloud Storage System” 0974-5645 IJST Vol 8, December 2015

Yogita Verma and Neerja Dharmale,” A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard”,International Journal of Science and Research (IJSR) 2013.

Gaurav Jain, Vikas sejwar,” A Survey On Security Using Encryption Techniques In Cloud” 2321-9939 Volume 5, Issue 2 IJEDR 2017.

Evgeny Milanov, “The RSA Algorithm”, 3 June 2009

M. Gobi and R. Sridevi, “An Approach for Secure Data Storage in Cloud Environment”, International Journal of Computer and Communication Engineering, Vol. 2, No. 2, March 2013.

Rashmi Singha,Isha Panchbhaiyaa ,Abhishek Pandeya & R H Goudar ,“Hybrid Encryption Scheme (HES): An Approach for Transmitting Secure Data over Internet”, International Conference on Intelligent Computing, Communication & Convergence (ICCC-2014),Elsevier.

Viney Pal Bansal, Sandeep Singh, “A Hybrid Data Encryption Technique using RSA and Blowfish for (CC)on FPGAs”, 978-1-4673-8253-3/15/©2015IEEE.

Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang, Zhang, Athanasios V. Vasilakos, Jian Shen, “Cloud data integrity checking with an identity-based auditing mechanism from RSA”, S0167-739X(16)30016-4/January 15, 2016.

Syed rizvi, Katie cover, Christopher gates, “A trusted third party(TTP) based encryption scheme for ensuring data confidentiality in cloud environment”, Procedia Computer Science 36 ( 2014 ) 381 – 386, Elsevier.

J. Taeho, L. Xiang-Yang, W. Zhiguo and W. Meng, “Privacy preserving cloud data access with multi-authorities”, Paper presented at the INFOCOM, 2013 Proceedings IEEE.

Peidong Sha , Zhixiang Zhu, “The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing”, 978-1-5090-1256-5/16/2016 IEEE.

Mr.V.Biksham, Dr. D.Vasumathi, “Query based computations on encrypted data through homomorphic encryption in (CC)security”, 978-1-4673-9939-5/16©2016 IEEE.

Yogita Verma and Neerja Dharmale,” A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard”,International Journal of Science and Research (IJSR) 2013.

Downloads

Published

2019-04-30

How to Cite

[1]
J. Patel, F. Suthar, and S. Khanna, “A Critical Analysis on Encryption Techniques used for Data Security in Cloud Computing and IOT (Internet of Things) based Smart cloud storage System: A Survey”, Int. J. Sci. Res. Net. Sec. Comm., vol. 7, no. 2, pp. 21–25, Apr. 2019.

Issue

Section

Survey Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.