Encryption Technique for a Trusted Cloud ComputingEnvironment

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 With varying amount of computing power present with everyone, it has become necessity of the hour to usecloud computing systems. It helps us to store our data within a virtual cloud structure. When we use the cloudstorage mechanism, the computing power gets distributed rather than being centralised. The whole system usesthe internet communication to allow linkage between client side and server side services/applications. Theservice providers may use the cloud platform as a web service platform or a data storage architecture. Thefreedom to use any device and location for cloud management is an added advantage for any user. Maintenanceof such systems is also easy as installation of resources aren’t required in each and every system which is usingcloud services. But along with varying flexibility and multi tenancy in usage comes the question of reliabilityand security. As in public hosting, the client is totally unaware of the security strategies applied by the serviceprovider, it creates a necessity for the end user to save the data from expected threats. One cannot totally relyon the quality of service (QoS) which is guaranteed by host servers. When we look at the security of data in thecloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince thecustomer on security factors. This paper describes a schema that ensures encryption of data using Advanced Encryption Standards. By doing so, the customer services can become quiet secured and thus can help in furtherenhancement of the cloud computing standards.

Authors and Affiliations

Aishwarya Asesh

Keywords

Related Articles

An Approach for Resource Management by Volunteering Community Cloud for an Educational Use

Abstract : In today’s (Information Technology) IT world, the service providers and the service users playing an important role. So the satisfactions at both the ends are also very important. This is a very common problem...

Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are...

 A Block Cipher Based Cryptosystem through Modified Forward  Backward Overlapped Modulo Arithmetic Technique  (MFBOMAT)

 In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Modified Forward Backward Overlapped Modulo Arithmetic Technique (MFBOMAT). The original messag...

 Foreground detection by using multi features

 Abstract: Foreground detection is an essential task in many applications and a commonly used approach to obtain foreground objects from the background. Many techniques exist, but due to shadows and changes in illum...

 Correlation Coefficient Based Average Textual Similarity Modelfor Information Retrieval System in Wide Area Networks

 Abstract: In wide area networks, retrieving the relevant text is a challenging task for information retrievalbecause most of the information requests are text based. The focus of paper is on the similarity measurem...

Download PDF file
  • EP ID EP158312
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

Aishwarya Asesh (2015).  Encryption Technique for a Trusted Cloud ComputingEnvironment. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 53-60. https://europub.co.uk/articles/-A-158312