A Hybrid Approach and Implementation of a New Encryption Algorithm for Data Security in Cloud Computing

نویسندگان

  • Md Asif Mushtaque
  • Harsh Dhiman
  • Shahnawaz Hussain
چکیده

Cloud Computing offers dynamic allocation of resources for guaranteed and reliable services. Users store their data on a single virtual server, when user wants to access any data that data might be changed or modified by unauthorized people for malicious purpose because user’s do not have direct control of data So security is a big challenge for cloud computing and it is necessary to increase the security level in the cloud where the user should free from modification of data. We proposed a new encryption algorithm (ASIF Encryption Algorithm) for data security in cloud computing. This Algorithm performs multiple rounds based on the length of the key. The main feature of this algorithm is that it generates a random key in each round and also selects the key randomly in each round to encrypt the data. There are three main advantages of this model (i) it reduces the size of data and requires less storage space taken by existing encryption techniques (ii) reduce the congestion between server and user by fast transmission and (iii) provides better security because of random key selection. Many authors have given their ideas on data security in cloud but no one gives the full control to the user. This approach gives the full control to the user on their data and they can protect their data from unauthorized people. In Cloud Computing several organizations store their data on a single server so there is a very huge amount of data stored on a server. This approach is a hybrid approach and uses a data compression method to reduce the size of original data then encrypt data using ASIF Encryption Algorithm. So, this model is beneficial for users as well as a service provider.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

A Model based on Cloud Computing for the implementation and management IT services in Banks

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

متن کامل

Image Encryption by Using Combination of DNA Sequence and Lattice Map

In recent years, the advancement of digital technology has led to an increase in data transmission on the Internet. Security of images is one of the biggest concern of many researchers. Therefore, numerous algorithms have been presented for image encryption. An efficient encryption algorithm should have high security and low search time along with high complexity.DNA encryption is one of the fa...

متن کامل

Integrated modeling and solving the resource allocation problem and task scheduling in the cloud computing environment

Cloud computing is considered to be a new service provider technology for users and businesses. However, the cloud environment is facing a number of challenges. Resource allocation in a way that is optimum for users and cloud providers is difficult because of lack of data sharing between them. On the other hand, job scheduling is a basic issue and at the same time a big challenge in reaching hi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014