International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 113 | Views: 157

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Enhancing Cloud Security and Integrity byUsing multiple Encryption Algorithms and Stripping

Shelna Valsan K. P. | Varshap

Abstract: Cloud computing is the delivery of computing as a service rather than a product or service, whereby shared computing resources, software, and infrastructures are provided to computers and other devices as a utility like the electricity grid over a network typically the Internet. A cloud is a combination of hardware, networks, storage, and services that helps in delivering computing as a service. In Cloud computing technology there are a set of important issues, which include issues of privacy, security, reliability. But the most important between them is security and how cloud provider assures it. Cloud computing has several customers such as ordinary users, and enterprises who have different motivation to move to cloud. For enterprises the most important problem is also security but with different vision. This paper discusses about the Cipher Cloud. Cipher Cloud lets users keep their data confidentially on public cloud. To achieve this, the Cipher Cloud uses a two-step encryption process, in which all the data sent from a client to a cloud server or vice versa is kept totally encrypted and confidential. The thorough security controls needed to protect the most sensitive data may not be guaranteed in public cloud computing architectures. This paper suggests unique encryption techniques, and also provide stripping technique in which data is segmented and stored in different locations (buckets/storage directories) in the cloud. Thus gives more security which is competitive and economical to private cloud models.

Keywords: Cloud computing, Encryption algorithms, Data segmentation, Data stripping, Data security enhancement

Edition: Volume 4 Issue 4, April 2015,

Pages: 1065 - 1068

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait