Enhancing Data Security in the Cloud Using the Proposed Algorithm

Naser Attar

Abstract


The distinctive advantages of the clouds have attracted the attention of many organizations, but the aspect leading to hesitation of these organizations is the method used for securing the data in the clouds and insuring about the security of the environment. By entrance of computers to human life and its development, the security has always been an issue. In this content, various schemes have been applied for security maintenance one of which is application of proper algorithm for encryption of data. Currently, standard encryption algorithms, such as WER, are used for encryption of data in cloud. As WER algorithm has been the subject of some attacks, in addition to solving its problems, a new algorithm is introduced. Regarding the extent of cloud network, the most important feature of the proposed algorithm is its resistivity against the attacks. The algorithm is designed and implemented in java script in cloudsim environment.


Keywords


data security; cloud computing security; encryption algorithm; AES Encryption Algorithm; cloudsim

Full Text:

PDF

References


Gowrigolla,S.,Masillamani,M.(2010). Design and Auditing of Cloud Security,LEEE.

TimMather,M.,SubraKumaraswamy,K and ShahedLatif,l.Cloud Securuty and Privacy

National Institute of Science and Technology(2011)."The NIST Definition of Cloud Computing".p.7.

Narjeet S.,Gaurav, R.,(2012). “Security on BCCP through AES Encryption Technique” .International Journal of Engineering Science & Advanced Technology.

Marko,M.,Franc,N .Hardware Implementation Of AES Algorithm.

Narjeet, S. , Gaurav R,.(2012). “Security on BCCP through AES Encryption Technique” . International Journal of Engineering Science & Advanced Technology

Manavski S. A..(2007). CUDA Compatible GPU As an Efficient Hardware Accelerator for AES ryptography, In Proceedings of IEEE International Conference on Signal Processing and Communication (ICSPC 2007), Dubai, United Arab Emirates, November. 2007, pp.65–68.

Eman.M,Abdelkader.S,Sherif,.E.(2013). Data Security Model for Cloud Computing , The Twelfth International Conference on Networks

Deyan,C., Hong Z.(2012).“Data Security and Privacy Protection Issues in Cloud Computing”. IEEE International Conference on Computer Science and Electronics Engineering.

Mangard,S.(2004).Securing Implementations of Block Ciphers against Side-Channel Attacks, Ph.D. Thesis, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria.

Mangard, S., Oswald, E.,and Popp T.,(2007). Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer – Verlag.

Daemen,J.Rijmen,V.(1999).“Resistance against Implementation Attacks: A Comparitive Study of the AES Proposals ” In Second AES Candidates Conf.

Ayanzadeh,R,Mousavi,Azamshahamatnia,e,. (2012).Fuzzy cellular Automata Based Random Numbers Generation , Academic Journals inc , ISSN 1819-3579.




Lululemon Black Friday cheap nfl jerseys Lululemon factory Outlet ny Black Friday discount tiffany outlet wholesale soccer jerseys online oakley black friday cheap nhl jerseys china cheap nfl jerseys north face black friday sale cheap nfl jerseys online Jordans Black Friday Sale 2015 Cheap Moncler Cyber Monday moncler outlet cheap soccer jerseys moncler outlet black friday cheap authentic nfl jerseys north face cyber monday Louboutin Black Friday canada wholesale cheap nfl jerseys lululemon cyber monday 2015 cheap nfl jerseys from china 2015 Cheap Moncler Black Friday Sale Moncler Cyber Monday 2015 cheap jerseys Lululemon Cyber Monday Sale jordans cyber monday deals 2015 Black Friday deals Lululemon 2015 jordan black friday 2015 Moncler Jackets Black Friday Sale 2015 Louboutin Pas Cher Black Friday 2015 Canada Lululemon north face black friday cheap wholesale soccer jerseys