Escolar Documentos
Profissional Documentos
Cultura Documentos
Volume 2, Issue 9, September - 2015. ISSN 2348 4853, Impact Factor 1.317
www.ijafrc.org
www.ijafrc.org
www.ijafrc.org
www.ijafrc.org
Sr.
No.
1
2
3
4
5
File
Type
EXEL
DOC
HTML
JPG
PDF
Data
Size
(KB)
30
32
286
763
2125
AES
(MS)
Single
Cloud
7
22
110
65
464
Multiple
Cloud
8
6
97
10
169
DES
(MS)
Single
Cloud
46
96
140
762
1517
Multiple
Cloud
39
40
140
139
471
3DES
(MS)
Single
Cloud
30
31
102
110
489
Multiple
Cloud
25
29
102
21
193
Below Figure shows the experimental result graph respectively for AES, DES and 3DES
500
Response Time (MS)
450
400
350
300
250
Single Cloud
200
150
Multiple Cloud
100
50
0
30
32
286
763
2125
File Size in KB
Figure : Comparison of different size of the file using AES in cloud environment
www.ijafrc.org
500
Response Time (MS)
450
400
350
300
250
Single Cloud
200
150
Multiple Cloud
100
50
0
30
32
286
763
2125
File Size in KB
Figure : Comparison of different size of the file using DES in cloud environment
500
Response Time (MS)
450
400
350
300
250
Single Cloud
200
150
Multiple Cloud
100
50
0
30
32
286
763
2125
File Size in KB
www.ijafrc.org
Eman M.Mohamed, Hatem S. Abdelkader, Sherif EI-Etriby, Enhanced Data Security Model for
Cloud Computing, The 8th International Conference on informatics and Systems (INFOS2012),
Cairo, pp CC-12-CC17, May 2012.
[2]
J.M. Bohli, N. Gruschka, M. Jensen, L.L. Iacono,N. Marnau, Security and Privacy-Enhancing Multicloud Architectures, IEEE Transaction on dependable and secure computing, VOL. 10, NO. 4, pp
212-224, March 2013.
[3]
Kan Yang, Ren, XiaohuaJia, Bo Zhang, and Ruitao Xie, DAC-MACS: Effective Data Access Control
for Multi-Authority Cloud Storage Systems, Information Forensic and Security, IEEE Transaction
on, Vol: 8, Issue: 11, pp 1790-1801, Aug 2013.
[4]
P. Mell and T. Grance, The NIST definition of cloud computing, National Institute of Standards
and Technology, NIST special publication, Computer Security Division, Sept 2011.
[5]
Jing-Jang Hwang and Hung-Kai Chuang A Business Model for Cloud Computing Based on a
Separate Encryption and Decryption Service, Information Science and Application (ICISA),
International Conference, Jeju Island, pp 1-7, April 2011.
[6]
J.-M. Bohli, M. Jensen, N. Gruschka, J. Schwenk, and L.L.L. Iacono, Security Prospects through
Cloud Computing by Adopting Multiple Clouds, Proc. IEEE Fourth Intl Conf. Cloud Computing
(CLOUD),Washington, DC , pp 565-572 ,July 2011.
[7]
[8]
Kan Yang, XiaohuaJia, Attributed-based Access Control for Multi-Authority Systems in Cloud
Storage, in Proceeding of IEEE 32nd International Conference on Distributed Computing
Systems , Macau , pp 536-545,18 21, June 2012.
[9]
Prakash G L, Dr. Manish Prateek, Dr. Inder Singh Data Encryption and Decryption Algorithms
using Key Rotations for Data Security in Cloud System Signal Propagation and Computer
Technology (ICSPCT), 2014 International Conference on, Ajmer, July 2014.
[10]
M. A. AlZain, B. Soh and E. Pardede, MCDB: Using Multi-Clouds to Ensure Security in Cloud
Computing, in Proceeding of 2011 Ninth IEEE International Conference on Dependable,
Autonomic and Secure Computing, Sydney, NSW, pp 784-791, Dec 2011.
[11]
www.ijafrc.org
[13]
Taeho Jung, Xiang-Yang Li, Zhiguo Wan,Meng Wan Privacy Preserving Cloud Data Access With
Multi-Authorities INFOCOM, 2013 Proceedings IEEE, Turin, pp 2625 2633 , April 2013.
[14]
ZHANG Wei, SUN Xinwei, Data Privacy Protection Using Multiple Cloud Storages Mechatronic
Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference
on, Shengyang, pp 1768-1772, Dec. 2013.
[15]
Ms. S. Vijaya Lekshmi, Mrs. M.P. Revathi, Implementing Secure Data Access Control for
Multiauthority Cloud Storage System Using Cipher text Policy-Attribute Based Encryption,
Information Communication and Embedded Systems (ICICES), 2014 International Conference on,
Chennai , pp 27-28 Feb. 2014.
[16]
Prashant Kumar , Lokesh Kumar, Security Threats to Cloud Computing, International Journal of
IT, Engineering and Applied Sciences Research (IJIEASR), Volume 2, No. 1, December 2013.
[17]
Bupesh Mansukhani, Tanveer A. Zia, An empirical study of challenges in managing the security
in cloud computing In Proceedings of the 9th Australian Information Security Management
Conference, Edith Cowan University, Australia, pp 172-181 , December 2011 .
[18]
Elminaam, D S Abd; Kader H M Abdual and Hadhoud, M Mohamed, Evaluating the Performance
of Sysmmetric Encryption Algorithms, International Journal of Network Security, Vol. 10, No. 3,
pp 216-222, May 2010.
[19]
G.Devi, M.Pramod Kumar, A CRM Service Based on a Separate Encryption and Decryption using
Blowfish algorithm International Journal of Computer Trends and Technology- volume 3, Issue 4,
pp 592-596, Aug 2012.
[20]
Jawahar Thakur, Nagesh Kumar, AES, DES, .Blowfish: Symmetric key algorithm Simulation based
performance analysis, International Journal of Emerging Technology and Advanced Engineering
,Volume 1, Issue 2, pp 6-12, December 2011.
[21]
Sunil Sanka, Chittaranjan Hota, Muttukrishnan Rajarajan, Secure Data Access in Cloud
Computing IEEE 4th International Conference on Internet Multimedia Services Architecture and
Application (IMSAA), Banglore, pp 1-6, December 2010.
[22]
[23]
Michael
Gregg
10
Security
Concerns
for
Cloud
Computing
http://viewer.media.bitpipe.com/1078177630_947/1268847180_5/WP_VI_10SecurityConcerns
cloudComputing.pdf, Accessed on Jan14.
[24]
Atul Kahate Cryptography and Network Security, Tata Mc-graw Hill, 3rd Edition 2008.
www.ijafrc.org
Stallings, W; Cryptography and Network Security: Principals and Practices, Prentice Hall, 8th
Edition, 2009.
[26]
Secaascategory8encryptionimplementation,
https://cloudsecurityalliance.org/download/secaas-category-8guidance.
[27]
D.R. Stinson Cryptography Theory and Practice CRC Press, INC., 2002.
[28]
Panchaghare V.K, Eastern Economy Edition, Cryptography and Information Security, PHI
publication, 17/11/2008
Retrieved
2012,
from
encryption implementation-
www.ijafrc.org