Securing Data Transmission in Cloud using Encryption Algorithms

Authors

  • Nigam A Department of Computer Science and Engineering, Amity University, U.P., India
  • Singh V Department of Computer Science and Engineering, Amity University, U.P., India

Keywords:

AES, 3DES, Cloud Security, Data Transmission, Encryption, Decryption

Abstract

Cloud computing provides an overwhelmingly versatile and flexible processing to associations that is accessible on interest. It lets enterprises to be fast, adaptable and ready to react quickly to the dynamic business situations. As cloud computing offers many advantages, it also has numerous security issues. The quantity of information exchanged over cloud is quite unsafe. The encryption specifications such as AES (Advanced Encryption Scheme), DES (Data Encryption Scheme), and 3DES (Triple Data Encryption Scheme) are widely used to solve such issues. But with the advancement in tools, these algorithms do not seem to be speedy and secure enough. In this paper we propose an encryption technique using two symmetric cryptography algorithms which supplies security to both the original file and the secret pass-code. The message to be sent is encrypted and decrypted using the AES algorithm. 3DES is used for encrypting and decrypting the secret key which encrypts the actual data to be transmitted.

References

Zaigham Mahmood, “Data Location and Security Issues in Cloud Computing”, International Conference on Emerging Intelligent Data and Web Technologies, ISBN: 978-0-7695-4456-4, October 2011.

Anjali Nigam and Vineet Singh, ‘A Study on Data Transmission Security Threats in Cloud’, International Journal of Innovative Research in Computer and Communication Engineering, ISSN (Print): 2320-9798, Volume 4, Issue 5, May 2016.

Sadiya Shakil and Vineet Singh, ‘Security of Personal Data on Internet of Things using Cryptographic Algorithm’, International Journal of Engineering Science and Computing, ISSN: 2321-3361, Volume 6, Issue 4, April 2016.

Mr. Gurjeevan Singh, Mr. Ashwani Singla and Mr. K S Sandha, ‘Cryptography Algorithm Comparison for Security Enhancement in Wireless Intrusion Detection System’, International Journal of Multidisciplinary Research, pp. 143-151, Volume 1, Issue 4, August 2011.

Akash Kumar Mandal, Chandra Parakash and Mrs. Archana Tiwari, ‘Performance Evaluation of Cryptographic Algorithms: DES and AES’, Conference on Electrical, Electronics and Computer Science, ISBN: 978-1-4673-1516-6, Page No. (1-5), March 1-2, 2012.

Supriya and Gurpreet Singh, ‘A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security’, International Journal of Computer Applications (pp. 0975-8887), Volume 67, Issue 19, April 2013.

Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, ‘Enhanced Secure Algorithm For Message Communication’, International Journal of Network Security & Its Applications, Volume 3, No. 5, Sep 2011.

Georgiana Mateescu and Marius Vladescu, ‘A Hybrid Approach of System Security for Small and Medium Enterprises: combining different Cryptography techniques’, Proceedings of the Federated Conference on Computer Science and Information Systems, pp. 659–662, 2013.

Shadma Fazal and B.P.S. Sengar, ‘Data Transmission Security Technique Using Encryption/Decryption and Steganographic Algorithms’, International Journal of Advanced Technology & Engineering Research, ISSN No: 2250-3536, Volume 4, Issue 4, July 2014.

Mahavir Jain and Arpit Agarwal. ‘Implementation Of Hybrid Cryptography Algorithm’, International Journal Of Core Engineering & Management (IJCEM), ISSN: 2348 9510, Volume 1, Issue 3, June 2014.

Nagendra Kumar, Ashok Verma and Ajay Lala, ‘Access, Identity and Secure Data Storage in Private Cloud using Digital Signature’, International Journal of Innovative Research in Computer and Communication Engineering, ISSN (Print): 2320-9798, Volume 2, Issue 3, March 2014.

Prof. S. N. Ghosh, Deepak T. Biradar, Ganesh C. Shinde, Sarika D. Bhojane and Manojkumar R. Shirapure, ‘Performance Analysis of AES, DES, RSA And AES-DES-RSA Hybrid Algorithm for Data Security’, International Journal of Innovative and Emerging Research in Engineering, ISSN: 2394-5494, Volume 2, Issue 5, May 2015.

Aayasha Kausar and Deepty Dubey, ‘Secure Data Transmission by Combining Genetic Algorithm and Steganography Techniques with Visual Cryptography Technique’, International Journal of Innovative Research in Computer and Communication Engineering, ISSN (Print): 2320-9798, Volume 3, Issue 11, November 2015.

Rachna Jain, Sushila Madan and Bindu Garg, ‘Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment’, International Journal of Computer Sciences and Engineering, E-ISSN: 2347-2693, Volume 3, Issue 1, January 2015.

Downloads

Published

2025-11-11

How to Cite

[1]
A. Nigam and V. Singh, “Securing Data Transmission in Cloud using Encryption Algorithms”, Int. J. Comp. Sci. Eng., vol. 4, no. 6, pp. 21–25, Nov. 2025.

Issue

Section

Research Article