slugSeccloud Protocol Implementation Using Aes Algorithm For Security And Privacy In Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
Cloud computing is a model for enabling convenient, on - demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction . Data and computations can be moved to the huge data centers, called cloud . In Seccloud protocol d ata is encrypted and send to the cloud server and decryption takes place at the server before storage. Computations were also performed on this data at the cloud server. For encryption RSA algorithm was us ed initially. But it suffered from brute force attack and other mathemati cal attacks . RSA also consumed high encryption and decryption time while execution. In order to overcome this AES algorithm was introduced. The operations in AES are repeated for seve ral stages called rounds. A change in a single bit in key or plain text results in a completely different cipher. This is an advantage o ver traditional stream ciphers . Also AES - 256 is more secure than RSA - 128 because it has 256 - bit key - that means 2 256 possible keys to brute force, as opposed to 2 128 in RSA. Thus AES remains as the preferred algorithm for encryption and decryption in the cloud computing environment.
Authors and Affiliations
Aneesha k Jose
Detection and Localization of IDS Based Spoofing Attackers in Wireless Sensor Network
Wireless spoofing attacks are easy to launch, it plays a significant role in the performance of wireless sensor networks. Although the identity of a node can be verified through cryptographic authentication, conventiona...
Autonomous Obstacle Detection and Tracking System
The most challenging domain in intelligent vehicle operation is collision avoidance. In case of extremities drivers show a great tendency to break vehicle than to steer although steering could be a better move. Automati...
Application of Non-Singular Matrices in Encryption and Decryption text of Cryptography
Cryptography, the science of encrypting messages in secret codes, has played an important role in securing information since past times. The basic idea of cryptography is that information can be encoded using an encrypt...
An Application Lean Six Sigma Tool for Reducing the Production Lead Time
Lean manufacturing is considered one of the quality improvement technique it increase the productivity and quality of product by reducing waste. Indian industries especially electronic sector have attempted to implement...
Design and FPGA Implementation of DDR SDRAM Controller
Technology is increasing day by day. The world is obsessed with smart phones, laptops and computers. RAM which is used in these devices is the internal memory of CPU for storing data, program and program result. SDRAM o...