ENHANCING THE DATA SECURITY IN CLOUD COMPUTING BY USING NEW ENCRYPTION METHOD

Authors

  • Farah Qasim Ahmed Ahmed Information Technology, Lebanese French University, KRG – Iraq
  • Amin Salih Mohammed Information Technology, Lebanese French University, KRG – Iraq

DOI:

https://doi.org/10.25212/lfu.qzj.3.1.40

Keywords:

Cloud computing, encryption algorithm, AES, 3×AES, DES, T-DES

Abstract

With the huge growth of the critical data that saved in the cloud, the security of the cloud should be safer. The growing of the cloud users attended with the rising of the harmful attacks and natural processes. Many weaknesses and security advisories are discovered. The idea of using the cloud is not considered as a new term but was traded widely these days with the improvement of business and general investments, which completely depends on internet services in executing the work with accuracy and
professionally. This paper proposed a new encryption technique that protects the data before it is saved to cloud services and retrieved, hence the confidentiality of the data can be secured. Also, this paper compares proposed method (3xAES) with AES and T-DES algorithms by calculating the key generation, encryption and decryption time for each algorithm. 3×AES technique is more efficient and secured, more than AES because it encrypts the text 3 times and each time it needs a different key for encrypt and
decrypt. Comparing between 3×AES with AES and T-DES and the result was that 3×AES has a higher security than AES and 3DES, due to the triple encryption for the 3×AES algorithm. By increasing the key length, the higher security will occur, so the algorithm 3×AES with the key length 256, will put in advance over AES and 3-DES for securing the data that save on the cloud computing.

Downloads

Download data is not yet available.

References

- Agoyi, M., & Seral, D. (2010, September). SMS security: an asymmetric encryption approach. In Wireless and Mobile Communications (ICWMC), 2010 6th International Conference on (pp. 448- 452). IEEE.

- Beimborn, D., Miletzki, T., & Wenzel, S. (2011). Platform as a service (PaaS). Business & Information Systems Engineering, 3(6), 381-384.

- Bhanot, R., & Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security and Its Applications, 9(4), 289306.

- Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.

- Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on (pp. 27-33). Ieee.

- Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2008). Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12), 280-286.

- G. Ramesh & Dr. R. Umarani (2012). Performance Analysis of Most Common Symmetrical Encryption Algorithms. International Journal of Power Control Signal and Computation (IJPCSC) Vol3. No1. Jan-Mar 2012 ISSN: 0976-268X.

- Jiménez Martínez, D. (2013). Privacy and confidentiality issues in cloud computing architectures.

- Jiménez Martínez, D. (2013). Privacy and confidentiality issues in cloud computing architectures.

- KARTIT, Z., & EL MARRAKI, M. (2015). Applying Encryption Algorithm to Enhance Data Security in Cloud Storage. Engineering Letters, 23(4).

- Kovachev, D., Renzel, D., Klamma, R., & Cao, Y. (2010, May). Mobile community cloud computing: emerges and evolves. In Mobile Data Management (MDM), 2010 Eleventh International Conference on (pp. 393-395). IEEE.

- Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., & Wong, D. S. (2015). L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowledge-Based Systems, 79, 18-26.

- Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.

- Meyer, C. H., & Matyas, S. M. (1982). Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems. John Wiley & Sons Inc.

- Pearson, S. (2009, May). Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 44-52). IEEE Computer Society.

- Saravanakumar, C., & Arun, C. (2014, November). Survey on interoperability, security, trust, privacy standardization of cloud computing. In Contemporary Computing and Informatics (IC3I), 2014 International Conference on (pp. 977-982). IEEE.

- Wang, Z. (2011, October). Security and privacy issues within the Cloud Computing. In Computational and Information Sciences (ICCIS), 2011 International Conference on (pp. 175-178). IEEE.

- Waqar, A., Raza, A., & Abbas, H. (2011, November). User privacy issues in Eucalyptus: a private cloud computing environment. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on (pp. 927932). IEEE.

- Wohl, A. (2010). Software as a Service (SaaS). The Next Wave of Technologies: Opportunities from Chaos, 97-113.

- Zhang, H., Jiang, G., Yoshihira, K., Chen, H., & Saxena, A. (2009, July). Intelligent workload factoring for a hybrid cloud computing model. In Services-I, 2009 World Conference on (pp. 701- 708). IEEE.

- Zhou, M. (2013). Data security and integrity in cloud computing

Downloads

Published

2018-03-30

How to Cite

Ahmed, F. Q. A., & Amin Salih Mohammed. (2018). ENHANCING THE DATA SECURITY IN CLOUD COMPUTING BY USING NEW ENCRYPTION METHOD. QALAAI ZANIST JOURNAL, 3(1), 1011–1021. https://doi.org/10.25212/lfu.qzj.3.1.40

Issue

Section

Articles