Performance Analysis of Data Security Using Cryptographic Policy With Instance Based Encryption in Cloud Computing

Abstract

This work discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The work will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them. Similarly, use of virtualization for cloud computing might risk data when a guest OS is run over a hypervisor without knowing the reliability of the guest OS which might have a security loophole in it. This task will also provide an insight on data security aspects for Data-in-Transit and Data-at-Rest. The study is based on all the levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). Growth of cloud computing is mainly hampered due to these security concerns and challenges. Proper security arrangements are need to be placed before selecting the service provider for any cloud computing service and customers need to be very careful about understanding the risks of security breaches and challenges of using this new computing environment. The methodology implements on Cloud Sim 3.0.1 toolbox, which is configure in Net Beans 8.1. The outcome demonstrates that it gives improved execution contrasted with supplementary predictable security algorithm. Crypto operation time, key operation time and total execution are reduced by 2.72%, 7.91% and 4.63% significantly. Juhi Yadava | Prof. S. R. Yadav | Prof. Madhuvan Dixit"Performance Analysis of Data Security Using Cryptographic Policy With Instance Based Encryption in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd17064.pdf http://www.ijtsrd.com/computer-science/other/17064/performance-analysis-of-data-security-using-cryptographic-policy-with-instance-based-encryption-in-cloud-computing/juhi-yadava

Authors and Affiliations

Keywords

Related Articles

Analysis of Deck Bridge with Pre Stress Deck Bridge under IRC Loading Conditions a Review

A bridge deck is the portion of a bridge that acts as the roadway in the support of vehicular or pedestrian traffic. While deck parts like trusses, girders, rails, arches, posts and cantilevers assume a number of forms a...

A Review on Grid-Connected PV System

The concept of injecting photovoltaic power into the utility grid has earned widespread acceptance in these days of renewable energy generation & distribution. Grid-connected inverters have evolved significantly with hig...

Wireless Mobile Charger Design Based on Inductive Coupling

This research described the construction and implementation of the contactless wireless mobile phone battery charging which becomes popularity nowadays. The power was transferred to the destination by means of inductive...

Analysing the Impact of Indian Disinvestment Policy on the Basis of Profitability: A Case of Selected Public Sector Units

As the Disinvestment took its final shape and implemented in the year 1991 formally by then Finance Minister Dr. Man Mohan Singh. The implication is yet to be tested about its successful implementation. Present paper is...

A Review on Fast Dissolving Oral Film

Recently, fast dissolving oral films have started gaining fame and acceptance as new drug delivery systems, which aim to enhance safety and efficacy of a drug molecule to achieve better patient compliance. It is a robust...

Download PDF file
  • EP ID EP389835
  • DOI -
  • Views 61
  • Downloads 0

How To Cite

(2018). Performance Analysis of Data Security Using Cryptographic Policy With Instance Based Encryption in Cloud Computing. International Journal of Trend in Scientific Research and Development, 2(5), 1510-1515. https://europub.co.uk/articles/-A-389835