slugSeccloud Protocol Implementation Using Aes Algorithm For Security And Privacy In Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
Cloud computing is a model for enabling convenient, on - demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction . Data and computations can be moved to the huge data centers, called cloud . In Seccloud protocol d ata is encrypted and send to the cloud server and decryption takes place at the server before storage. Computations were also performed on this data at the cloud server. For encryption RSA algorithm was us ed initially. But it suffered from brute force attack and other mathemati cal attacks . RSA also consumed high encryption and decryption time while execution. In order to overcome this AES algorithm was introduced. The operations in AES are repeated for seve ral stages called rounds. A change in a single bit in key or plain text results in a completely different cipher. This is an advantage o ver traditional stream ciphers . Also AES - 256 is more secure than RSA - 128 because it has 256 - bit key - that means 2 256 possible keys to brute force, as opposed to 2 128 in RSA. Thus AES remains as the preferred algorithm for encryption and decryption in the cloud computing environment.
Authors and Affiliations
Aneesha k Jose
Challenges Faced During Designing, Simulation of Microstrip Patch Antenna in HFSS and Testing After Fabrication
The Microstrip antenna we are designing here needs to go through the following three stages theoretical calculations, simulation and testing after fabrication. In the process of testing we are comparing the obtained res...
Revenue and Profit Maximization of Intermediary by Providing Multiple Cloud Services to Users
Data streaming with various cloud condition is a potential response for give the profitable pay on demand respond in due order regarding tradeoff between whole deal leasing and contrasting burdens. In this paper, we pro...
Phytochemical analysis of Cinnamomum zeylanicum for antibacterial activity against B.subtilis
Based on Ethno botanical knowledge, an attempt has been made to evaluate the antibacterial properties of Cinnamomum zeylanicum (Dalchini), against medically important bacterial strain, namely Bacillus subtilis. Disc dif...
A Survey of VANET Based Secure Message Communication in Cluster Formation by DSRC Protocol
Vehicular Ad Hoc Networks (VANET) is kind of a special wireless ad hoc network, which has the characteristics of huge node mobility and fast topology changes. The Vehicle ad Hoc Networks may provide a large variety of s...
Analysis of Natural Convection Heat Transfer from Rectangular Fin with Different Forms of Perforation Using Finite Element Analysis
This study examines the natural convective heat transfer from rectangular fins with different forms of perforations under natural convection. In this analysis six different forms of perforations are used with including...