Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:6 Issue:3 Year: 15 April,2021 Pages:1589-1598
As an emerging technology and business paradigm, Cloud computing platforms provide easy access to a company’s high-performance, computing and storage infrastructure through web services. Mainly cloud computing technology enables users/enterprises to eliminate the requirements for setting up of expensive computing infrastructure and reduces system’s operating costs. Data security and privacy are increasingly becoming the predominant issue that affects small and medium business organizations’ readiness to migrate their data from on-site to cloud storage facilities. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intrusions. Therefore, cloud computing providers need to protect their user’s sensitive data from insider or outsider attacks by installing an intrusion detection system. Form the viewpoint of security, Deduplication, various risks and issues are identified in the area of Cloud Computing. There are various risks associated with the security but one of the major issues is the security of data being stored on the provider's cloud and privacy while the data is being transmitted. This paper deals with various issues associated with security and focus mainly on the data security and methods of providing security by data encryption. Various encryption methods of block cipher algorithms such as Triple DES, Blowfish are discussed for providing solutions to cloud
Cloud, Cryptography
[1]. Y ohannes kurniawan. The role of knowledge management system in school: perception of applications and benefits. Journal of Theoretical and Applied Information Technology, 10th March. Vol. 61 No.1(2014). [2]. JUDITH K. LARSEN. Knowledge Utilization. Knowledge. Creation. Diffusion. Utilization, V ol March /980421-442. [3]. William Wagner. Issues in Knowledge Acquisition. 1990 ACM 089791-416-3. [4]. Koech Sitienei Caroline. Knowledge Storage, Retrieval and Employee Performance: The Moderating Role of Employee Engagement. International Journal of Small Business and Entrepreneurship Research V ol.3, No.6, pp.1-13, November 2015. [5]. Mazrekaj, A., Shabani, I. and Sejdiu, B., 2016. Pricing schemes in cloud computing: an overview. International Journal of Advanced Computer Science and Applications, 7(2), pp.80-86. [6]. S. Carlin and K. Curran, “Cloud Computing Security”, Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments, vol. 1, no. 2, pp. 12-17, 2013. Available: https://www.igi- global.com/chapter/cloud-computing- security/68920. [Accessed 8 December 2020]. [7]. Jyoti, T. and Pandi, G., 2017. Achieving Cloud Security Using Hybrid Cryptography Algorithm. International Journal of Advance Research and Innovative Ideas in Education, 3(5). [8]. D. P. Timothy and A. K. Santra, “A hybrid cryptography algorithm for cloud computing security,” 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), V ellore, 2017, pp. 1-5, doi: 10.1109/ICMDCS.2017.8211728. [9]. Odun-Ayo, I., Ajayi, O., Akanle, B. and Ahuja, R., 2017, December. An overview of data storage in cloud computing. In 2017 International Conference on Next Generation I No 3, Computing and Information Systems (ICNGCIS) (pp. 29-34). IEEE. [10]. "Cloud Storage Security Issues | A Research Report", IS Decisions, 2020. [Online].Available: https://www.isdecisions.com/cloud- storage-security-issues/. [Accessed: 08- Dec- 2020]. [11] Kumar, M.A. and Karthikeyan, S., 2012. Investigating the efficiency of Blowfish and Rejindael (AES) Algorithms. International Journal of Computer Network & Information Security, 4(2), p.22. [12] Mahalle, V .S. and Shahade, A.K., 2014, October. Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm. In 2014 International Conference on Power, Automation and Communication (INPAC) (pp. 146- 149). IEEE. [13] Bhandari, A., Gupta, A. and Das, D., 2016, January. Secure algorithm for cloud computing and its applications. In 2016 6th International Conference- Cloud System and Big Data Engineering (Confluence) (pp. 188-192). IEEE. [14] Timilsina, S. and Gautam, S., 2019. Analysis of Hybrid Cryptosystem Developed Using Blowfish & ECC with Different Key Size. Technical Journal,