ENHANCING THE DATA SECURITY IN CLOUD COMPUTING BY USING NEW ENCRYPTION METHOD
DOI:
https://doi.org/10.25212/lfu.qzj.3.1.40الكلمات المفتاحية:
Cloud computing, encryption algorithm, AES, 3×AES, DES, T-DESالملخص
With the huge growth of the critical data that saved in the cloud, the security of the cloud should be safer. The growing of the cloud users attended with the rising of the harmful attacks and natural processes. Many weaknesses and security advisories are discovered. The idea of using the cloud is not considered as a new term but was traded widely these days with the improvement of business and general investments, which completely depends on internet services in executing the work with accuracy and
professionally. This paper proposed a new encryption technique that protects the data before it is saved to cloud services and retrieved, hence the confidentiality of the data can be secured. Also, this paper compares proposed method (3xAES) with AES and T-DES algorithms by calculating the key generation, encryption and decryption time for each algorithm. 3×AES technique is more efficient and secured, more than AES because it encrypts the text 3 times and each time it needs a different key for encrypt and
decrypt. Comparing between 3×AES with AES and T-DES and the result was that 3×AES has a higher security than AES and 3DES, due to the triple encryption for the 3×AES algorithm. By increasing the key length, the higher security will occur, so the algorithm 3×AES with the key length 256, will put in advance over AES and 3-DES for securing the data that save on the cloud computing.
التنزيلات
المراجع
- Agoyi, M., & Seral, D. (2010, September). SMS security: an asymmetric encryption approach. In Wireless and Mobile Communications (ICWMC), 2010 6th International Conference on (pp. 448- 452). IEEE.
- Beimborn, D., Miletzki, T., & Wenzel, S. (2011). Platform as a service (PaaS). Business & Information Systems Engineering, 3(6), 381-384.
- Bhanot, R., & Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security and Its Applications, 9(4), 289306.
- Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.
- Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on (pp. 27-33). Ieee.
- Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2008). Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12), 280-286.
- G. Ramesh & Dr. R. Umarani (2012). Performance Analysis of Most Common Symmetrical Encryption Algorithms. International Journal of Power Control Signal and Computation (IJPCSC) Vol3. No1. Jan-Mar 2012 ISSN: 0976-268X.
- Jiménez Martínez, D. (2013). Privacy and confidentiality issues in cloud computing architectures.
- Jiménez Martínez, D. (2013). Privacy and confidentiality issues in cloud computing architectures.
- KARTIT, Z., & EL MARRAKI, M. (2015). Applying Encryption Algorithm to Enhance Data Security in Cloud Storage. Engineering Letters, 23(4).
- Kovachev, D., Renzel, D., Klamma, R., & Cao, Y. (2010, May). Mobile community cloud computing: emerges and evolves. In Mobile Data Management (MDM), 2010 Eleventh International Conference on (pp. 393-395). IEEE.
- Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., & Wong, D. S. (2015). L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowledge-Based Systems, 79, 18-26.
- Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.
- Meyer, C. H., & Matyas, S. M. (1982). Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems. John Wiley & Sons Inc.
- Pearson, S. (2009, May). Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 44-52). IEEE Computer Society.
- Saravanakumar, C., & Arun, C. (2014, November). Survey on interoperability, security, trust, privacy standardization of cloud computing. In Contemporary Computing and Informatics (IC3I), 2014 International Conference on (pp. 977-982). IEEE.
- Wang, Z. (2011, October). Security and privacy issues within the Cloud Computing. In Computational and Information Sciences (ICCIS), 2011 International Conference on (pp. 175-178). IEEE.
- Waqar, A., Raza, A., & Abbas, H. (2011, November). User privacy issues in Eucalyptus: a private cloud computing environment. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on (pp. 927932). IEEE.
- Wohl, A. (2010). Software as a Service (SaaS). The Next Wave of Technologies: Opportunities from Chaos, 97-113.
- Zhang, H., Jiang, G., Yoshihira, K., Chen, H., & Saxena, A. (2009, July). Intelligent workload factoring for a hybrid cloud computing model. In Services-I, 2009 World Conference on (pp. 701- 708). IEEE.
- Zhou, M. (2013). Data security and integrity in cloud computing
التنزيلات
منشور
كيفية الاقتباس
إصدار
القسم
الرخصة
الحقوق الفكرية (c) 2018 Farah Qasim Ahmed Ahmed, Amin Salih Mohammed
هذا العمل مرخص بموجب Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission