Cryptography based Techniques of Encryption for Security of Data in Cloud Computing Paradigm

Cryptography based Techniques of Encryption for Security of Data in Cloud Computing Paradigm

  IJETT-book-cover           
  
© 2021 by IJETT Journal
Volume-69 Issue-10
Year of Publication : 2021
Authors : Adel Rajab, Sehrish Aqeel, Mana Saleh Al Reshan, Awais Ashraf, Sultan Almakdi, Khairan Rajab
DOI :  10.14445/22315381/IJETT-V69I10P201

How to Cite?

Adel Rajab, Sehrish Aqeel, Mana Saleh Al Reshan, Awais Ashraf, Sultan Almakdi, Khairan Rajab, "Cryptography based Techniques of Encryption for Security of Data in Cloud Computing Paradigm," International Journal of Engineering Trends and Technology, vol. 69, no. 10, pp. 1-6, 2021. Crossref, https://doi.org/10.14445/22315381/IJETT-V69I10P201

Abstract
Cloud Computing (CC) is a cheap and userfriendly compatible platform that aims to provide IT users over the internet to a business organization as well as another internet consumer by a variety of its services. It is also becoming the fastest growing technology that does not need in-stalled hardware or software at consumer’s devices. Cloud technology has many advantages in terms of economic cost and IT load. So, currently, the adoption of this emerging technology has increased tremendously. One critical issue in CC is the security of data that is mainly tacked by numerous encryption methods. Based on a systematic literature review, this paper identifies two critical aspects; firstly, the key encryption methods used for securing data in the cloud-based system, and secondly, how encryption techniques are validated in previous research studies? The result of this systematic literature review identified that RSA is a widely used algorithm to ensure security in CC as compared to all existing used algorithms to protect data of the cyber world.

Keywords
Cloud-based systems; encryption; cryptography; data security.

Reference
[1] P. Agarwal, Cryptography based security for a cloud computing system, International Journal of Advanced Research in Computer Science, 8(5) (2017) 2193–2197, 2017.
[2] D. Sengupta, Designing of hybrid RSA encryption algorithm for cloud security, International Journal of Innovative Research in Computer and Communication Engineering, 3(5) (2015) 4146– 4152.
[3] R. Chatterjee, S. Roy, and U. Scholar, Cryptography in cloud computing: a basic approach to ensure security in the cloud, International Journal of Engineering Science, 7(5) (2017) 11818– 11821.
[4] D. AbdElminaam, Improving the security of cloud computing by building new hybrid cryptography algorithms, International Journal of Electronics and Information Engineering, 8(1) (218) . 40–48.
[5] O. Harfoushi, B. Alfawwaz, N. Ghatasheh, R. Obiedat, M. Abu- Faraj, et al., Data security issues and challenges in cloud computing: a conceptual analysis and review, Communications and Network, 06(1) (2014) 15–21.
[6] E. Alsolami, Security threats and legal issues related to cloud computing-based solutions, International Journal of Computer Science and Network Security, 18(5) (2018) 156–163.
[7] P. Brereton, B. Kitchenham, D. Budgen, M. Turner, and M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, Journal of Systems and Software, 80(4) (2007) 571–583.
[8] K. Hashizume, D. Rosado, E. Fernández-Medina and E. Fernandez, An analysis of security issues for cloud computing, Journal of Internet Services and Applications, 4(1) (2013) 1–13.
[9] Y. Liu, J. Ryoo and S. Rizvi, Ensuring data confidentiality in cloud computing: an encryption and trust-based solution, In 23rd Wireless and Optical Communication Conference (WOCC), Newark, New Jersey, U.S.A, (2015) 1–6.
[10] C. Yang and J. Lai, Protecting data privacy and security for cloud computing based on secret sharing, in the International Symposium on Biometrics and Security Technologies (ISBAST), Chengdu, China, (2013) 259–266.
[11] P. Salim, A. Abbas, and M. Qasim, Improving data storage security in cloud computing using rc6 algorithm, IOSR Journal of Computer Engineering, 19(5) (2017) 51–56.
[12] S. Han and J. Xing, Ensuring data storage security through a novel third party auditor scheme in cloud computing, in the IEEE International Conference on Cloud Computing and Intelligence Systems, Beijing, China, (2011) 264–268.
[13] T. Sathyanarayana and L. Sheela, Data security in cloud computing, International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), 2(1) (2013) 822–827.
[14] M. Abolghasemi, M. Sefidab, and R. Atani, Using location-based encryption to improve the security of data access in cloud computing, in the International Conference on Advances in Computing, Communications and Informatics (ICACCI), Mysore, India, (2013) 261–265.
[15] U. Pius, E. Onyebuchi, O. Chinasa, and E. Adoba, A cloud-based data security system using advanced encryption (aes) and blowfish algorithms, Journal of Scientific and Engineering Research, 5(6) (2018) 59–66.
[16] J. Hamdard, N. Delhi, P. Agarwal, J. Hamdard and N. Delhi, Cryptography based security for cloud computing system, International Journal of Advanced Research in Computer Science, 8(5) (2017) 2193–2197.
[17] S. Talluru, Secure cloud storage using homomorphic encryption, International Journal for Research in Applied Science & Engineering Technology, 6(4) (2018) 2194–2203.
[18] U. Somani, K. Lakhani and M. Mundra, Implementing digital signature with rsa encryption algorithm to enhance the data security of cloud in cloud computing, in the First International Conference On Parallel, Distributed and Grid Computing (PDGC), Solan, India, (2010) 211–216.
[19] P. Kalpana, Data security in cloud computing using rsa algorithm,” International Journal of Research in Computer and Communication Technology, 1(4) (2012) 143–146.
[20] A. Sharma, R. Kumar and V. Mansotra, Proposed stemming algorithm for hindi information retrieval, International Journal of Innovative Research in Computer and Communication Engineering, 3297(6) (2016) 11449–11455.
[21] S. More and S. Chaudhari, Third party public auditing scheme for cloud storage,” Procedia Computer Science, 79(1) (2016) 69–76.
[22] L. Tawalbeh, N. Darwazeh, R. Al-Qassas and F. AlDosari, A secure cloud computing model based on data classification,” Procedia Computer Science, 52(1) (2015) 1153–1158.
[23] J. Singh, B. Kumar and A. Khatri, Improving stored data security in cloud using rc5 algorithm, in Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, (2012) 1-5.
[24] M. Rewagad and M. Pawar, Use of digital signature with Diffiehellman key exchange and aes encryption algorithm to enhance data security in cloud computing, International Conference on Communication Systems and Network Technologies, Gwalior, India, (2013) 437–439.
[25] M. Sulochana and O. Dubey, Preserving data confidentiality using multi-cloud architecture, Procedia Computer Science, 50(1) (2015) 357–362.
[26] Q. Liu, G. Wang and J. Wu, Time-based proxy re-encryption scheme for secure data sharing in a cloud environment, Information Sciences, 258(1) (2014) 355–370.
[27] M. Hossain, A. Ullah, N. Khan and M. Alam, Design and development of a novel symmetric algorithm for enhancing data security in cloud computing, Journal of Information Security, 10(4) (2019) 199–236.
[28] S. Delfin, R. Sai, J. Meghana, L. Kundana and S. Sharma, Cloud data security using aes algorithm, International Research Journal of Engineering and Technology, 5(10) (2018) 1189-1192.
[29] S. Thokchom and D. Saikia, Privacy preserving and public auditable integrity checking on dynamic cloud data, International Journal of Network Security, 21(2) (2019) 221–229.
[30] E. Ramadan and M. Djamilou, Using cryptography algorithms to secure cloud computing data and services, American Journal of Engineering Research (AJER), 6(10) (2017) 334–337.
[31] P. Bandal, A. Dhane, S. Chavan and P. Nikam, Key exchange privacy preserving technique in cloud computing, International Research Journal of Engineering and Technology, 5(3) (2018) 3113–3117.
[32] M. Junaid, A. Shaikh, M. Hassan, A. Alghamdi, K. Rajab, M.S. AlReshan and M. Alkinani, Smart Agriculture Cloud using AI based Techniques, Energies,l. 14(16:5129) (2021) 1-15.
[33] R. Ratra and P. Gulia, Privacy Preserving Data Mining: Techniques and Algorithms, International Journal of Engineering Trends and Technology, 68(11) (2020) 56-62.