Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique

Authors

  • Aasarmya A Center of Cloud Infrastructure & Security, Gyan Vihar University, Jaipur, India
  • Agarwal S Center of Cloud Infrastructure & Security, Gyan Vihar University, Jaipur, India

DOI:

https://doi.org/10.26438/ijcse/v7i8.3943

Keywords:

Cloud computing, Software as a services, Encryption, Asymmetric algorithms, RSA, AES

Abstract

Cloud computing is an increasingly famous and growing technology which has led to a new dawn in the field of Information Technology. It has created a drastic change in the trend of different digital devices. Cloud Computing corresponds to both, the applications provided as services over the internet and the hardware elements and systems software in the data-centers that provide those respective services. In this paper, improving the security of data within the cloud when the data is migrated from one source to cloud or vice-versa, using an enhanced randomized encryption technique. During the analysis of providing security to a large amount of data in the cloud environment using various encryption techniques, we formulated that the asymmetric algorithms are incapable to encrypt a data in a bulk or in large amount when used singly. Security is the major issue in cloud computing system so we are using the concept of asymmetric algorithm when we are migrating one source file to the cloud.

References

[1] Secure Migration of Various Databases over A Cross Platform Environment, an International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume 2 Issue 4 April, 2013.

[2] Understanding pricing and migration cost for Cloud adoption in business environments by Dimitris Monogenis, MSc Computing and Management 2011/2012.

[3] Mobile One Time Passwords and RC4 Encryption for Cloud Computing , Master’s Thesis in Computer Network Engineering by Markus Johnsson & A.S.M Faruque Azam.

[4] 15th International Conference on Management of Data COMAD 2009, Mysore, India, December 9–12, 2009 ©Computer Society of India, 2009, A Unified and Scalable Data Migration Service for the Cloud Environments.

[5] Data Migration: Connecting Databases in the Cloud, a research paper published by authors: Farah Habib Chanchary and Samiul Islam in ICCIT 2012.

[6] Using the cloud for data migration: practical issues and legal implications - 16 Feb 2011 - Computing Feature.

[7] Database security in the cloud by Imal Sakhi, Examensarbete inom Datateknik Grundnivå, 15 hp Stockholm 2012.

[8] A Symmetric Key Cryptographic Algorithm by Ayushi, ©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 15

[9] Microsoft Data Encryption Toolkit for Mobile PCs: Security Analysis Version 1.0, published: April 2007.

[10] “A Security approach for Data Migration in Cloud Computing”, an International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 ISSN 2250-3153.

[11] “Cloud computing a CRM Service Based on Separate Encryption and Decryption using Blowfish algorithm”, International Journal on Recent and Innovation Trends in Computing and Communication Volume: 1 Issue: 4 217 – 223

[12] Slim Trabelsi, Yves Roudier. , Research Report RR-06-164 Enabling Secure Service Discovery with Attribute Based Encryption.

[13] RSA algorithm achievement with federal information processing signature for data protection in cloud computing, International Journal of Computers & Technology, ISSN: 2277-3061 Volume 3. No. 1, AUG, 2012.

[14] International Journal of Scientific Research in Computer Sciences and Engineering (ISSN: 2320-7639)

[15] International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256).

Downloads

Published

2019-08-31
CITATION
DOI: 10.26438/ijcse/v7i8.3943
Published: 2019-08-31

How to Cite

[1]
A. Aasarmya and S. Agarwal, “Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique”, Int. J. Comp. Sci. Eng., vol. 7, no. 8, pp. 39–43, Aug. 2019.

Issue

Section

Research Article