Encryption Technique for a Trusted Cloud ComputingEnvironment

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 With varying amount of computing power present with everyone, it has become necessity of the hour to usecloud computing systems. It helps us to store our data within a virtual cloud structure. When we use the cloudstorage mechanism, the computing power gets distributed rather than being centralised. The whole system usesthe internet communication to allow linkage between client side and server side services/applications. Theservice providers may use the cloud platform as a web service platform or a data storage architecture. Thefreedom to use any device and location for cloud management is an added advantage for any user. Maintenanceof such systems is also easy as installation of resources aren’t required in each and every system which is usingcloud services. But along with varying flexibility and multi tenancy in usage comes the question of reliabilityand security. As in public hosting, the client is totally unaware of the security strategies applied by the serviceprovider, it creates a necessity for the end user to save the data from expected threats. One cannot totally relyon the quality of service (QoS) which is guaranteed by host servers. When we look at the security of data in thecloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince thecustomer on security factors. This paper describes a schema that ensures encryption of data using Advanced Encryption Standards. By doing so, the customer services can become quiet secured and thus can help in furtherenhancement of the cloud computing standards.

Authors and Affiliations

Aishwarya Asesh

Keywords

Related Articles

 Reducing Cross-ISP Traffic in P2P Systems Using Adaptive  Search Radius

 Peer to Peer communication has become very popular these days .This popularity and increase in P2P traffic has given birth to many internet traffic management problems for service providers. One of these problems...

Detecting contiguous regions having traffic problems using taxi trajectories

Nowadays, taxi is one of the most popular transportation modes. There is a large amount of passenger using taxi everyday and taxi trajectories represent the mobility of people. In the big cities, taxi is equipped GPS dev...

 Blue-Droid: An Intelligent Library Management System on Android Platform

 Abstract : Bluetooth Library Manager (BLM) is library management software which can be used in any library for maintaining different functions like book search, requisition submission, data entry etc. I have implem...

 Security Evaluation of Google Chrome Operating System

 Abstract: Due to the increase nature of computer threats and attacks, the security of the operating system isparamount in the computing world today. Every modern computer system, from network servers, workstationde...

High Efficient Complex Parallelism for Cryptography

Cryptography is an important in security purpose applications. This paper contributes the complex,parallelism mechanism to protect the information by using Advanced Encryption Standard (AES) Technique. AES is an encrypti...

Download PDF file
  • EP ID EP158312
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

Aishwarya Asesh (2015).  Encryption Technique for a Trusted Cloud ComputingEnvironment. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 53-60. https://europub.co.uk/articles/-A-158312