Securing Storage Data in Cloud Using RC5 Algorithm: Jay Singh, Brajesh Kumar, Asha Khatri
Securing Storage Data in Cloud Using RC5 Algorithm: Jay Singh, Brajesh Kumar, Asha Khatri
Securing Storage Data in Cloud Using RC5 Algorithm: Jay Singh, Brajesh Kumar, Asha Khatri
Abstract
Software
(SaaS)
Plateform
(PaaS)
Infrastructure
(IaaS)
3. Layers in Cloud
The Internet functions through a series of network
protocols that form a stack of layers, as shown in the
figure 2. Once an Internet connection is established
among several computers, it is possible to share
services within any one of the following layers
[Pana11].
Keywords
Cloud computing, security, Encryption, storage
1. Introduction
CLIENT
APPLICATION
PLATFORM
INFRASTRUCTURE
SERVER
Figure 2: Cloud layer
International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970)
Volume-2 Number-4 Issue-6 December-2012
7. Problems Definition
International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970)
Volume-2 Number-4 Issue-6 December-2012
=
of
In place of
<SchedulerUri
Value
tcp://localhost:9090/Aneka
Figure 4: Aneka Container Logging (Real time
monitoring and log archives)
Running and Encryption Wizard
96
International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970)
Volume-2 Number-4 Issue-6 December-2012
9. Result Analysis
Here we are comparing the actual result with Amazon
s3 storage service. Amazon S3 (Simple Storage
Service) is an online storage web service which is
offered by Amazon Web Services. Amazon S3
provides storage through web services interface
REST.
References
[1] [Akhi11] Akhil Behl, Emerging Security Challenges in
Cloud Computing . Congress on Information and
Communication Technologies (WICT), 2011 World.
[2] [Chang10] Chang-Lung Tsai Uei-Chin Lin Allen Y.
Chang Chun-Jung Chen.
97
International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970)
Volume-2 Number-4 Issue-6 December-2012
Information Security Issue of Enterprises Adopting the
Application of Cloud Computing.
National Science
Council and Chinese Culture University of Taiwan, R.O.C.
[3] [Jian10] Jianfeng Yang, Zhibin Chen, Cloud Computing
Research and Security Issues. 2010 International
Conference on Computational Intelligence and Software
Engineering (CiSE).
[4] Junfeng Tian, Zhijie Wu. A Trusted Control M odel of
Cloud Storage.2012 International Conference on Computer
Distributed Control and Intelligent Enviromental
M onitoring.
[5]
[Pana11]
Panagiotis
Kalagiakos,
Panagiotis
Karampelas, Cloud Computing Learning, Application of
Information and Communication Technologies (AICT),
2011 5th International Conference.
[6] [Thar10] Tharam Dillon, Chen Wu and Elizabeth
Chang. Cloud Computing: Issues and Challenges. 2010
24th IEEE International Conference on Advanced
Information Networking and Applications.
[7][Went12] Wentao Liu, Research on Cloud Computing
Security Problem and Strategy. 2012 2nd International
Conference on Consumer
Electronics,
Communications and Networks (CECNet).
[8] [Cong12] Cong Wang, Qian Wang. Toward Secure and
Dependable Storage Services in Cloud Computing. ieee
transactions on services computing, vol. 5, no. 2, april-june
2012.
[9] [Eman12] Eman M .M ohamed. Cloud and M obile
Computing Track Randomness Testing of M odem
Encryption Techniques in Cloud Environment. The 8th
International Conference on INFOrmatics and Systems
(INFOS2012).
[10] [Eric12] M ohammed A. AlZain, Ben Soh and Eric
Pardede AlZain, M .A.; Soh, B.; Pardede, E. A New
Approach Using Redundancy Technique to Improve
Security in Cloud Computing. International Conference
on Cyber Security, Cyber Warfare and Digital Forensic
(CyberSec), 2012.
[11] [Guru12] Gurudatt Kulkarni & Jayant Gambhir, A
Security Aspects in Cloud computing. 2012 IEEE 3rd
International Conference on Software Engineering and
Service Science (ICSESS).
98