Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 5, Issue 1, 2018, Page No: 1-8
doi:dx.doi.org/10.20431/2349-4859.0501001

Elaborating Security Algorithms in Cloud Environment

Shaffy Bansal,Dr.Gagandeep Jagdev

1.Research Scholar, M.Phil. (Comp. Appl.), Guru Kashi University, Talwandi Sabo (PB).
2.Dept. of Comp. Science, Punjabi University Guru Kashi College, Damdama Sahib (PB).

Citation :Shaffy Bansal,Gagandeep Jagdev, Elaborating Security Algorithms in Cloud Environment International Journal of Research Studies in Computer Science and Engineering 2018, 5(1) : 1-8

Abstract

The security of data is the primary concern of every organization today irrespective of its size. The large organizations responsible for managing bigger monetary information, bio-data and other relevant information are losing their valuable information or data in motion or in rest to unauthorized parties, hackers, or competitors. When such data gets into the hands of malicious persons, the organizations lose millions of rupees. Today the data protection has become vital for businesses. The data or information should be encrypted or scrambled in such a manner that even if it gets into the hands of hackers or unauthorized users, it becomes useless for them. The scrambling of plaintext delivers a safe and nice significance for secured data and communication. With the expansion of LAN, MAN, and WAN, the computer network is exposed to unauthorized people providing them access to attack personal and organizational data in network and cloud environment. Every organization and individual desires that security and privacy of their data should be maintained. This can be achieved by applying cryptographic algorithms on such critical data in cloud environment. This research paper studies the different encryption/decryption algorithms responsible for security of data placed in cloud. The paper shows the implementation of AES algorithm on 256-bit key size.


Download Full paper: Click Here