Cloud Computing Security by Integrating Classical Encryption

被引:1
作者
Goodarzi, Koorosh [1 ]
Karimi, Abbas [1 ]
机构
[1] Islamic Azad Univ, Arak Branch, Fac Engn, Dept Comp Engn, Markazi, Iran
来源
MEDICAL AND REHABILITATION ROBOTICS AND INSTRUMENTATION (MRRI2013) | 2014年 / 42卷
关键词
cryptographic algorithms; cloud computing; classical and modern cryptographic algorithms;
D O I
10.1016/j.procs.2014.11.069
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud calculation provides sharing of the spread sources and the services related to the organizations or websites users. As cloud computing of distributed resource is shared in an open environment, the security is the biggest problem in software development. On one hand user controls data and process on his own computer and on the other hand, data services provided by the company and the vendor are kept in the cloud so that the user does not know where to store the data and has no control over it. In this paper, we try a hybrid methodology of modern and classic cryptographic algorithms for providing data security in a cloud environment. (C) 2014 The Authors. Published by Elsevier B.V.
引用
收藏
页码:320 / 326
页数:7
相关论文
共 9 条
[1]  
[Anonymous], 2012, VSRD IJCSIT
[2]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[3]  
Diaz-Sanchez D., 2013, TELECOMMUN SYST, P1
[4]   Security Concerns in Cloud Computing [J].
Khalil, Issa M. ;
Khreishah, Abdallah ;
Bouktif, Salah ;
Ahmad, Azeem .
PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, :411-416
[5]  
Peris-Lopez P, 2006, LECT NOTES COMPUT SC, V4217, P159
[6]  
Saeed F, 2010, INT J COMPUT SCI NET, V10, P280
[7]  
Salomon D., 2003, Data privacy and security: encryption and information hiding
[8]  
Sastry V., 2009, INT J COMPUTER THEOR, V1, P594
[9]  
Tanimoto S., 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI), P147, DOI 10.1109/CNSI.2011.82