Performance Analysis of Data Security Using Cryptographic Policy With Instance Based Encryption in Cloud Computing

Abstract

This work discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The work will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them. Similarly, use of virtualization for cloud computing might risk data when a guest OS is run over a hypervisor without knowing the reliability of the guest OS which might have a security loophole in it. This task will also provide an insight on data security aspects for Data-in-Transit and Data-at-Rest. The study is based on all the levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). Growth of cloud computing is mainly hampered due to these security concerns and challenges. Proper security arrangements are need to be placed before selecting the service provider for any cloud computing service and customers need to be very careful about understanding the risks of security breaches and challenges of using this new computing environment. The methodology implements on Cloud Sim 3.0.1 toolbox, which is configure in Net Beans 8.1. The outcome demonstrates that it gives improved execution contrasted with supplementary predictable security algorithm. Crypto operation time, key operation time and total execution are reduced by 2.72%, 7.91% and 4.63% significantly. Juhi Yadava | Prof. S. R. Yadav | Prof. Madhuvan Dixit"Performance Analysis of Data Security Using Cryptographic Policy With Instance Based Encryption in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd17064.pdf http://www.ijtsrd.com/computer-science/other/17064/performance-analysis-of-data-security-using-cryptographic-policy-with-instance-based-encryption-in-cloud-computing/juhi-yadava

Authors and Affiliations

Keywords

Related Articles

Analysis and Interpretation of Financial Statement as a Managerial Tool for Decision Making

Financial statement analysis and interpretation is a completely vital tool of exact control choice making is enterprise employer. Good decision ensures commercial enterprise survival, profitability and increase. Without...

Teachers’ Assessment on Their Occupational

Emerging facts have been revealed that the pandemic negatively affect people’s lives due to the newness of the nature of job and its processes. In this study, occupational and technological stress level of teachers are a...

A Review Study on Post Implementation of Goods and Service Tax (GST) on Aviation Sector in India

In this paper we focused on the post implementation review on impact of Goods and Service Tax (GST) on aviation sector in India. Aviation is one of the fastest growing sectors in Indian economy which is extensively used...

A Forming a Motivation for Independent Reading in a Foreign Language

The independent work of students of all forms and types of educational activity. The purpose of independent work expanding the scientific outlook, mastering methods of theoretical research, development of students indepe...

Experimental Study on the Properties of Rice Husk Ash with A.A.A Portland Cement

In the last decades, the use of residue in civil construction, especially in addition to concrete, has been subject of many researches due to reduce the environmental pollution factors, it may lead several improvements o...

Download PDF file
  • EP ID EP389835
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

(2018). Performance Analysis of Data Security Using Cryptographic Policy With Instance Based Encryption in Cloud Computing. International Journal of Trend in Scientific Research and Development, 2(5), 1510-1515. https://europub.co.uk/articles/-A-389835