- Associate Professor, Department of Computer Science, Poornima Institute of Engineering and Technology, Rajasthan, India
- Student, Department of Computer Science, Poornima Institute of Engineering and Technology, Rajasthan, India
Nowadays the information is being produced increasingly more by means of the enterprises and is being elevated swiftly that want will be saved and used e.g., e-mails, facts, photograph album, tax document, financial transaction, and so on. Now statistics owners are required to store their nearby facts organization on the cloud for its elasticity with financial savings. This not simplest gives flexibility to users but additionally makes our content material on hand to us whenever and anywhere we want them. In cloud computing, the information of customers could be saved in storage furnished with the aid of cloud carrier companies (CSP’s). Cloud carrier companies must be having an ideal process to defend user’s information, specifically the data from revelation to customers who are not authorized. If we backup our documents to the cloud, then we may be sure that our information will in no way be misplaced. This paper proposes an algorithm which might encrypt the flies uploaded on cloud garage services and would decrypt the documents when they have been downloaded the use of the keys that were generated on the time of encryption. This might help in preventing undesirable intrusion into private information documents and might at ease user’s information.
Keywords: Cloud, Symmetric & Asymmetric Key, Cryptography, Encryption, Decryption.
[This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)]
1. National Institute of Standards and Technology, Computer Security Resource Center 2016, available http://csrc.nist.gov/groups/SNS/cloud-computing
2. Srinivas, J., K. Venkata Subba Reddy, and A. Moiz Qyser. “”Cloud computing basics.”” International journal of advanced research in computer and communication engineering 1.5 (2012): 343–347.
3. A Vouk, Mladen. “”Cloud computing–issues, research and implementations.”” Journal of computing and information technology 16.4 (2008): 235–246.
4. Alharthi, Abdulrahman, et al. “”An overview of cloud services adoption challenges in higher education institutions.”” Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics. Vol. 1. SCITEPRESS-Science and Technology Publications, 2015.
5. Rivest, R.L., Adleman, L. and Dertouzos, M.L., 1978. On data banks and privacy homomorphisms. Foundations of secure computation, 4 (11), pp. 169–180.
6. Rivest, Ronald L., Len Adleman, and Michael L. Dertouzos. “”On data banks and privacy homomorphisms.”” Foundations of secure computation 4.11 (1978): 169–180.
7. Kelly, James Mark. “”Cloud Computing and Cryptography.””
8. Kamara, Seny, and Kristin Lauter. “”Cryptographic cloud storage.”” International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2010.
9. Aw Ideler, Hugo. “”Cryptography as a service in a cloud computing environment.”” EINDHOVEN UNIVERSITY OF TECHNOLOGY, Department of Mathematics and Computing Science (2012).
10. Zhang, Shuai, et al. “”Cloud computing research and development trend.”” 2010 Second international conference on future networks. IEEE, 2010.
|Received||April 1, 2022|
|Accepted||April 22, 2022|
|Published||May 21, 2022|