2nd International Conference on Materials Science and Sustainable Manufacturing Technology
Improving Data Security in Cloud Computing
R.Subha, Vaijayanth S, Sabari Mukundh J, Sanjay R, Santhosh T, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.
The objective of this project is to create a secure method of encrypting and storing data in cloud computing
settings. In order to accomplish this, we compare the performance of three popular encryption algorithms—AES, DES,
and MES—with various key lengths. Finding the ideal encryption technique and key length for our project is the goal of
this evaluation. A secure system for encrypting and storing data in cloud computing settings is the anticipated result of
this project, and it can help safeguard sensitive data from unwanted access and potential security breaches.This study can
help with the future development of more effective cloud security solutions by illuminating the efficacy of various
encryption approaches in protecting data in the cloud.
Keywords
Modular Encryption, Advanced Encryption Standard, Symmetric key, Data Encryption Standard, Role-
based access control.
Y. Al-Issa, M. A. Ottom, and A. Tamrawi, “eHealth Cloud Security Challenges: A Survey,” Journal of Healthcare Engineering, vol. 201 9, pp. 1–15, Sep. 2019, doi: 10.1155/2019/7516035.
H. Jin, Y. Luo, P. Li, and J. Mathew, “A Review of Secure and Privacy-Preserving Medical Data Sharing,” IEEE Access, vol. 7, pp. 61656–61669, 2019, doi: 10.1109/access.2019.2916503.
D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4946–4967, Jun. 2019, doi: 10.1109/jiot.2019.2897619.
S. Chenthara, K. Ahmed, H. Wang, and F. Whittaker, “Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing,” IEEE Access, vol. 7, pp. 74361–74382, 2019, doi: 10.1109/access.2019.2919982.
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud,” Proceedings of the 16th ACM conference on Computer and communications security, Nov. 2009, doi: 10.1145/1653662.1653687.
Garg, S., &Buyya, R. (2013). Cloud computing security: a review. In Security and privacy in communication networks (pp. 263-282). Springer, Berlin,Heidelberg.
Tsai, W. T., Lai, C. F., Chiang, M. C., &Chiang,W. Y. (2014). A review of cloud computing security issues. Journal of Internet Technology, 15(5), 643-650.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
A. Algarni, “A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems,” IEEE Access, vol. 7, pp. 101879 – 101894, 2019, doi: 10.1109/access.2019.2930962.
P. M. Mell and T. Grance, “The NIST definition of cloud computing,” 2011, doi: 10.6028/nist.sp.800-145.
W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” 2011, doi: 10.6028/nist.sp.800 -144.
Marian, R., &Butoi, B. (2013). Cloud computing security risks and controls. Informatica Economica, 17(2),139-149.
Rios, E., Mancuso, V., &Egea-Lopez, E. (2013). Towards a classification framework for security threats in cloud computing. Journal of NetworkandComputerApplications,36(1),273-285.
"Security Guidance for Critical Areas of Focus in Cloud Computing V4.0" by Cloud Security Alliance(CSA).
R. Vacca, “Cloud Computing Security,” Nov. 2020, doi: 10.1201/9780429055126.
Cite this article
R.Subha, Vaijayanth S, Sabari Mukundh J, Sanjay R, Santhosh T, “Improving Data Security in Cloud Computing”, Advances in Computational Intelligence in Materials Science, pp. 023-027, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_5