#

Advances in Computational Intelligence in Materials Science

Book Series

About the Book
About the Author
Table of Contents

Buy this Book

eBook
  • • Included format: Online and PDF
  • • eBooks can be used on all reading devices
  • • ISSN : 2960-2408
  • • ISBN : 978-9914-9946-9-8


Hand Cover
  • • Including format: Hardcover
  • • Shipping Available for individuals worldwide
  • • ISSN : 2960-2394
  • • ISBN : 978-9914-9946-8-1


Services for the Book

Download Product Flyer
Download High-Resolutions Cover

2nd International Conference on Materials Science and Sustainable Manufacturing Technology

Improving Data Security in Cloud Computing

R.Subha, Vaijayanth S, Sabari Mukundh J, Sanjay R, Santhosh T, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.


Online First : 07 June 2023
Publisher Name : AnaPub Publications, Kenya.
ISBN (Online) : 978-9914-9946-9-8
ISBN (Print) : 978-9914-9946-8-1
Pages : 023-027

Abstract


The objective of this project is to create a secure method of encrypting and storing data in cloud computing settings. In order to accomplish this, we compare the performance of three popular encryption algorithms—AES, DES, and MES—with various key lengths. Finding the ideal encryption technique and key length for our project is the goal of this evaluation. A secure system for encrypting and storing data in cloud computing settings is the anticipated result of this project, and it can help safeguard sensitive data from unwanted access and potential security breaches.This study can help with the future development of more effective cloud security solutions by illuminating the efficacy of various encryption approaches in protecting data in the cloud.

Keywords


Modular Encryption, Advanced Encryption Standard, Symmetric key, Data Encryption Standard, Role- based access control.

  1. Y. Al-Issa, M. A. Ottom, and A. Tamrawi, “eHealth Cloud Security Challenges: A Survey,” Journal of Healthcare Engineering, vol. 201 9, pp. 1–15, Sep. 2019, doi: 10.1155/2019/7516035.
  2. H. Jin, Y. Luo, P. Li, and J. Mathew, “A Review of Secure and Privacy-Preserving Medical Data Sharing,” IEEE Access, vol. 7, pp. 61656–61669, 2019, doi: 10.1109/access.2019.2916503.
  3. D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4946–4967, Jun. 2019, doi: 10.1109/jiot.2019.2897619.
  4. S. Chenthara, K. Ahmed, H. Wang, and F. Whittaker, “Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing,” IEEE Access, vol. 7, pp. 74361–74382, 2019, doi: 10.1109/access.2019.2919982.
  5. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud,” Proceedings of the 16th ACM conference on Computer and communications security, Nov. 2009, doi: 10.1145/1653662.1653687.
  6. Garg, S., &Buyya, R. (2013). Cloud computing security: a review. In Security and privacy in communication networks (pp. 263-282). Springer, Berlin,Heidelberg.
  7. Tsai, W. T., Lai, C. F., Chiang, M. C., &Chiang,W. Y. (2014). A review of cloud computing security issues. Journal of Internet Technology, 15(5), 643-650.
  8. Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
  9. A. Algarni, “A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems,” IEEE Access, vol. 7, pp. 101879 – 101894, 2019, doi: 10.1109/access.2019.2930962.
  10. P. M. Mell and T. Grance, “The NIST definition of cloud computing,” 2011, doi: 10.6028/nist.sp.800-145.
  11. W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” 2011, doi: 10.6028/nist.sp.800 -144.
  12. Marian, R., &Butoi, B. (2013). Cloud computing security risks and controls. Informatica Economica, 17(2),139-149.
  13. Rios, E., Mancuso, V., &Egea-Lopez, E. (2013). Towards a classification framework for security threats in cloud computing. Journal of NetworkandComputerApplications,36(1),273-285.
  14. "Security Guidance for Critical Areas of Focus in Cloud Computing V4.0" by Cloud Security Alliance(CSA).
  15. R. Vacca, “Cloud Computing Security,” Nov. 2020, doi: 10.1201/9780429055126.

Cite this article


R.Subha, Vaijayanth S, Sabari Mukundh J, Sanjay R, Santhosh T, “Improving Data Security in Cloud Computing”, Advances in Computational Intelligence in Materials Science, pp. 023-027, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_5

Copyright


© 2023 R.Subha, Vaijayanth S, Sabari Mukundh J, Sanjay R, Santhosh T. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.