A Comparative Survey of Algorithm used in Cloud Computing

IJCSEC Front Page

Abstract:
Cloud computing is emerged as a data interactive model in which users can store their data in an online cloud server. Cloud computing services can be private, public or hybrid. Users can access the applications as utilities over the internet. We can create, configure and customize the application. Online storing and retrieving data in third party's cloud system causes serious conflict over data security and data confidentiality. To overcome this problem, methods like cryptography can be used. The data stored in encrypted format and it will make available to the authenticated requested person after decrypting the data. As the cloud server has numerous amounts of data, load balancing is also a serious concern. Here we have studied and made a comparative analysis of algorithm used in cloud computing for secured data forwarding and load balancing.

Keywords: Cloud Computing, Proxy Re-encryption, Erasure Coding, Cryptographic Splitting, Cloud Storage, Block Cipher, Encryption, Decryption.

References:

  1. Jadhav Ashwini,J. S.Pawar,Kadwe Yugandhara, Pagar Pooja, Patil Suchita, ”Secure Data Storage and Forwarding in Cloud using AES and HMAC”, International Research Journal of Engineering and Technology, February 2016.
  2. Parul Arora, Tanjyot Aurora, ”Blowfish Algorithm”, International Journal Of Computer Science and Communication Engineering,2013.
  3. K.Vasanth, Saikumar Manku, ”Blowfish encryption algorithm for information security”, ARPN journal of engineering and applied sciences,june 2015.
  4. Rohaya Latip,Shah Murtaza Rashid Al Masud,Tasquia Mizan,”Modified bees life algorithm for job scheduling in hybrid cloud”, International journel of engineeeing and technology, July 2012.
  5. Randeep Kaur, Supriya Kinger, Analysis of security algorithm in cloud computing”, International journal of application or innovation in engineering and management, march 2014.
  6. Rachna Arora,Anshu Parashar,”Secure user data in cloud computing using encryption algorithms”,International journal of engineering research and algorithms, August 2013.
  7. Ateniese G, Burns R, CurtmolaR, Herring J, Kissner L, Peterson Z, and Song D, “Provable Data Possession at Untrusted Stores,”Proc. 14th ACM Conf. Computer and Comm. Security (CCS), pp. 598-609, 2007.
  8. Ateniese G, BensonK, and Hohenberger S, “Key-Private Proxy Re-Encryption, ”Proc. Topics in Cryptology (CT-RSA),pp. 279-294, 2009.
  9. Ateniese G, Fu K, Green M, and Hohenberger S, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,”ACM Trans. Information and System Security, vol. 9, no. 1, pp. 1-30, 2006.
  10. Ateniese G, Mancini L.V ,Pietro R,D and Tsudik G, “Scalable and Efficient Provable Data Possession,”Proc. Fourth Int’l Conf. Security and Privacy in Comm. Netowrks (SecureComm),pp 1-10, 2008.
  11. Blaze M, Bleumer G, and Strauss M, “Divertible Protocols and Atomic Proxy Cryptography,”Proc. Int’l Conf. Theory and Applica-tion of Cryptographic Techniques (EUROCRYPT),pp 127-144, 1998.