A novel security mechanism using AES cryptography approach in cloud computing

被引:1
|
作者
Muthulakshmi, B. [1 ]
Venkatesulu, M. [2 ]
机构
[1] Kalasalingam Univ, Dept Comp Applicat, Krishnankoil, Tamil Nadu, India
[2] Kalasalingam Univ, Dept Informat Technol, Krishnankoil, Tamil Nadu, India
关键词
cloud computing; decryption; encryption; file chunk system; key management;
D O I
10.1002/dac.4631
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For a smart cloud computing system, security and privacy are the required factors. In recent days, the evolvement of cloud technology is immense, according to which several cloud service providers (CSPs) evolved. Each CSP has its infrastructure with its security policies. Even though still the security in cloud computing is an existing challenge, it is more important to maintain the trustiness of cloud environment among the cloud users. On this motto, we propose a novel tailored-advanced encryption standard (AES) Cryptographic Algorithm (TCA). AES is one of the popular cryptography algorithms. We indulged in increasing the performance of this algorithm by minimizing the time taken for the cryptography process. Here, the cryptography is processed with AES algorithm. In order to improve the efficiency of AES, a concept of a chunk file system is introduced. The input file is chunked into multiple which facilitates quick and effective encryption. To prove the efficiency of our proposed system, a comparison work is carried out with the existing algorithms lightweight keyword searchable encryption (LFSE) and cloud key management system (CKMS). The comparison work is based on the aspect of time taken during key generation, encryption and decryption. The obtained result is plotted, and comparison output clearly states our TCA's excellence in the aspect of efficiency compared to others.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing
    Corpuz, Reynaldo R.
    Gerardo, Bobby D.
    Medina, Ruji P.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 157 - 162
  • [42] Enhancing Data and Privacy Security in Mobile Cloud Computing through Quantum Cryptography
    Han, Jiawei
    Liu, Yanheng
    Sun, Xin
    Song, Lijun
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 398 - 401
  • [43] Post-quantum cryptography-driven security framework for cloud computing
    Ukwuoma, Henry Chima
    Arome, Gabriel
    Thompson, Aderonke
    Alese, Boniface Kayode
    OPEN COMPUTER SCIENCE, 2022, 12 (01) : 142 - 153
  • [44] A Novel Cloud Computing Algorithm of Security and Privacy
    Chen, Chih-Yung
    Tu, Jih-Fu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [45] Monitoring based security approach for cloud computing
    Yadav A.
    Ritika
    Garg M.L.
    Ingenierie des Systemes d'Information, 2019, 24 (06): : 611 - 617
  • [46] A NOVEL BASED SECURITY ARCHITECTURE OF CLOUD COMPUTING
    Gupta, Subham Kumar
    Rawat, Seema
    Kumar, Praveen
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [47] A Layered Security Approach for Cloud Computing Infrastructure
    Yildiz, Mehmet
    Abawajy, Jemal
    Ercan, Tuncay
    Bernoth, Andrew
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 763 - +
  • [48] Security event correlation approach for cloud computing
    Ficco, M. (massimo.ficco@unina2.it), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07):
  • [49] Enhanced Cloud Data Security Using AES Algorithm
    Akhil, K. M.
    Kumar, Praveen M.
    Pushpa, B. R.
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [50] Modeling a Sandbox Security Mechanism in Cloud Computing Environment using Bayesian Game
    Kandoussi, El Mehdi
    El Mir, Iman
    Hanini, Mohamed
    Haqiq, Abdelkrim
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2018, 13 (01): : 12 - 20