Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Encryptions for Data Sharing in Cloud

S. Pavithra, Gopal Krishna Shyam


Cloud computing basically insinuates putting off and procuring the information furthermore, programs on top of web in spite of PC’s equipment. It gives creating condition, capacity to deal with the assets, application programming over the cloud. It gives assets to clients on a compensation as you use premise. Cloud storage suppliers offer cloud encryption administrations to encode information before it is exchanged to the cloud for capacity. Run of the mill cloud encryption applications go from scrambled associations with constrained encryption just of information that is known to be delicate, (for example, account accreditations) to end-to-end encryption of any information that is transferred to the cloud. In these models, cloud storage suppliers encode information upon receipt, passing encryption keys to the clients so information can be securely decoded when required.


End-To-End Encryption, Cloud Computing

Full Text:



Ms. Disha H. Parekh, Dr. R. Sridaran, ”An Analysis of Security Challenges in Cloud Computing”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4, No.1, 2014

Bruce Schneier, ”The Blowfish encryption algorithm9”, Dr. Dobb’s Journal of Software Tools, 19(4), p. 38, 40, 98, 99, April 1994

Ari Juels, Thomas Ristenpart, Honey EncryptionEncryption beyond Brute Force Barrier IEEE Security and Privacy July/August 2014.

Vinayak P P, Nahala M A, Avoiding Brute Force attack in MANET using Honey Encryption, IJSR Volume 4 Issue 3, March 2015.

Tharam Dillon, Chen Wu and Elizabeth Chang, Cloud Computing: Issues and Challenges, in Proceeding of 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 27-33, 20-23 April 2013.

E.Thmbiraja, G.Ramesh, Dr.R.Umarani, A survey on various most com-mon encryption techniques, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 7, July 2012.

Gurjeevan Singh, Ashwani Kumar Singla, K.S. Sandha Performance Evaluation of Symmetric Cryptographic Algorithms, International Jour-nal of Electronics and Communication Technology Vol 2 Issue 3, Sep 2014.

Kuyoro S. O.; Ibikunle F; Awodele O., Cloud Computing Security Issues and challenges in Proceeding of International Journal of Computer Networks (IJCN), Volume (3), Issue (5), 2011.

Shyam Patidar; Dheeraj Rane; Pritesh Jain A Survey Paper on Cloud Computing in proceeding of Second International Conference on Ad-vanced Computing Communication Technologies, 2012.

Qi Zhang, Lu Cheng and Raouf Boutaba, Cloud computing: state-of-the-art and research challenges..

X. Liu, Y. Zhang, B. Wang, and J. Yan, Mona: Secure multi-owner data sharing for dynamic groups in the cloud, IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 11821191, Jun. 2013.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.