A Securing Cloud Database Architecture While Migrating from one Cloud to another along with Data using AES

Abstract

Later engage in Cloud Computing has been determined by new offerings of Registering assets that are engaging because of for every use valuing and versatileadaptability, giving a critical playing point over the commonplace procurement andarrangement of gear that was a while ago needed. Cloud Computing is a new computing model that distributes the computing missions on a resource pool that includes a large amount of computing resources. More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Today most cloud computing system use cryptography techniques to provide data security and mutual authentication. This research paper helps in securing the data without affecting the original data and protecting the data. The vital data ineach level can be encrypted by using encryption/decryptionalgorithm and keys before store them in the Cloud. In thistechnique the aim is to store data in a secure and safe way inorder to avoid intrusions and attacks. Also, it will reduce the costand time to store the encrypted data in the Cloud Computing.The paper conducts a performance analysis by implementing theAdvanced Encryption Standard (AES) in all levels in order tocheck the performance of model.

Authors and Affiliations

Adesh Patel, Sumit Kumar Yadav

Keywords

Related Articles

A Study On Financial Performance Of Cement Companies In India With Reference to Ultratech Cement Limited and OCL India Limited - A Comparative Analysis

India is the second largest producer of cement in the world. Cement production increased at a compound annual growth rate (CAGR) of 9.7 per cent in the period 2006– 2013, producing 272 million tonnes (MT). In this study...

Adaptive Learning for Data Mining Classification

The classification of algorithm for dataset Recommendation should be appropriate as it is very important and beneficial task but it goes through some difficulties. As per No-Free-Lunch theorem, for different classificat...

Laptop Operated Fire Fighting Robot

detecting fire and extinguishing it is a harmful job that puts life of a fire fighter at hazard. There are many fire accidents which fire fighter had to lose their lives in the line of duty every year throughout the wor...

slugEnergy Efficient & Secured Group Communication in MANET using RBMULTICAST Protocol

Energy is one of the main issues to be discussed in MANET Sensor network. Since each sensor node is powered by a battery which is not rechargeable and it is not possible to change the batter. Prior creation of a multica...

VR Based Monitoring System

we describe the design and development of hardware and software of a portable Virtual Reality in this research paper. The easy access of the device is achieved using a small credit-card sized, yet a powerful computer, R...

Download PDF file
  • EP ID EP20140
  • DOI -
  • Views 268
  • Downloads 4

How To Cite

Adesh Patel, Sumit Kumar Yadav (2015). A Securing Cloud Database Architecture While Migrating from one Cloud to another along with Data using AES. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20140