Encryption Technique for a Trusted Cloud ComputingEnvironment

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 With varying amount of computing power present with everyone, it has become necessity of the hour to usecloud computing systems. It helps us to store our data within a virtual cloud structure. When we use the cloudstorage mechanism, the computing power gets distributed rather than being centralised. The whole system usesthe internet communication to allow linkage between client side and server side services/applications. Theservice providers may use the cloud platform as a web service platform or a data storage architecture. Thefreedom to use any device and location for cloud management is an added advantage for any user. Maintenanceof such systems is also easy as installation of resources aren’t required in each and every system which is usingcloud services. But along with varying flexibility and multi tenancy in usage comes the question of reliabilityand security. As in public hosting, the client is totally unaware of the security strategies applied by the serviceprovider, it creates a necessity for the end user to save the data from expected threats. One cannot totally relyon the quality of service (QoS) which is guaranteed by host servers. When we look at the security of data in thecloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince thecustomer on security factors. This paper describes a schema that ensures encryption of data using Advanced Encryption Standards. By doing so, the customer services can become quiet secured and thus can help in furtherenhancement of the cloud computing standards.

Authors and Affiliations

Aishwarya Asesh

Keywords

Related Articles

 Production of Clean Fuel from Waste Biomass using Combined Dark and Photofermentation

 Sequential dark and photo- fermentation is a rather new approach in biological hydrogen gas production. In the present work, two-stage fermentation process consisting of dark and photo-fermentation periods was ca...

Cloud Based Vital Health Stats Monitoring using IoT

Abstract : While there are lot of devices and applications available for monitoring the vital health statistics of human beings, there is still room for enhancement and improvement. This paper’s intention is to address o...

 A Web Extraction Using Soft Algorithm for Trinity Structure

 Abstract: Trinity is a structure for automatically fetch or extract or segment the content from the website or thewebpages by the source of internet. The required applications are done by the trinity nature in orde...

 Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

 In this paper, Adaptive Modulation and Coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The u...

 Recapitulating the development initiatives of a robust information  security safeguard: RITSB-the proposed solution

 Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...

Download PDF file
  • EP ID EP158312
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

Aishwarya Asesh (2015).  Encryption Technique for a Trusted Cloud ComputingEnvironment. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 53-60. https://europub.co.uk/articles/-A-158312