Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Security

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-4                       
Year of Publication : 2013
Authors : Dr.A.Padmapriya , P.Subhasri

MLA 

Dr.A.Padmapriya , P.Subhasri. "Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Security". International Journal of Engineering Trends and Technology (IJETT). V4(4):1067-1071 Apr 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

Cloud computing is a large pool of easily and accessible virtualized resources, such as hardware, development platforms and services. The main problem associated with cloud computing is data privacy, security etc. In this paper proposed the new level of data security solution with encryption using ASCII full characters. The main scope of this paper to solve the security issues in both cloud providers and cloud consumers

References

[1] Booth.D,(2004).web service architecture.Retrived from http://www.w3.org:http//
[2] Cong wang ,Qian wang, and Kui ren ,Wenjing lou,”Ensuring data storage security in cloud computing” at IEEE(8 - 1 - 4244 - 3876 - 1/09)
[3] Cloud computing principles, systems and applications NICK Antonopoulos http://mgitech.wordpress.com.
[4] Cloud computing methodology, systems and applications lizhe wang, rajiv Ranjan.http://www.unitiv. com.
[5] Dulaney E.,CompTIA Security+ Study Guide, Fourth Edition, Wiley Publishing Inc., Indiana,2009.
[6] F.A.Alvi, B.S.Choudary, N.Jaferry,”Review on cloud computing security issues & challenges”, iaesjournal.com , vo l (2) (2012).
[7] John Harauz , Lori M.Kaufman ,Bruce potter,”Data security in world of cloud computing” by IEEE computer and reliability societies,jul/Aug 2009 pp 61 - 64.
[8] Jagpal Singh,Krishnan lal and Dr.Anil kumar Shrotiya, Journal of Computer Scie nce and Applications., ISSN 2231 - 1270 Volume 4, Number 1 (2012), pp. 1 - 7. http://www.irphouse.com
[9] http://en.wikipedia.org/wiki/caesar_cipher , Caesar cipher (Last accessed: April 20, 2012).
[10] Kevin Hamlen, Murat kantarcioglu, Latifur Khan and Bhavani Thurasingham, International Journal of Information Security and Privacy, 4(2), p.p(39 - 51), April - June 2010.
[11] Luciano D. and Prichett G., “Cryptography: fr om Caesar Ciphers to public - key Cryptosystem”,The College Mathematics Journal,vol 18, no 1, pp. 2 - 17, 1987.
[12] Maha TEBAA, Saïd EL HAJJI and Abdellatif EL GHAZI, “Homomorphic Encryption Applied to the Cloud Computing Security”, Proceedings of the World C ongress on Engineering 2012 Vol 1 WCE 2012, July 4 - 6, 2012, London, U.K
[13] Neha Jain and Gurpreet Kaur, “Implementing DES Algorithm in Cloud for Data Security “, VSRD - IJCSIT, Vol. 2 (4), 2012, 316 - 321.
[14] Parsi Kalpana, Sudha Singaraju ,” Data Securi ty in Cloud Computing using RSA [15] http://www.mytestbox.com/miscellaneous/cloud - computing - grid - computing - utility - computing - list - top - providers/
[15] Security analysis of cloud computing: ( http://cloud computing.sys - con.com/node /1330353).
[16] VAMSEE KRISHNA YARLAGADDA and SRIRAM RAMANUJAM “Data security in cloud computing “, vol.2 (1), pp. (15 - 23) (2011)
[17] Veerraju Gampala, Srilakshmi Inuganti and Satish Muppidi, “Data Security in Cloud Computing with Elliptic Curve Crypt ography”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231 - 2307, Volume - 2, Issue - 3, July 2012.

Keywords
Cloud computing, Security, Encryption algorithms, ASCII code