Open Access Open Access  Restricted Access Subscription or Fee Access

Diverse Encryption Plans in Conveyed Stockpiling

M. Arun, G. Sreeram

Abstract


Distributed computing is client to store huge measure of information. The information security and security of the put away information is kept up by the cloud administration supplier. For a solitary cloud a specific encryption and unscrambling norms are been utilized. The insights about the principles utilized are known by the cloud administration supplier (CSP). The client won't have a thought regarding the security benchmarks utilized as a part of the cloud for his information. Distinctive client needs diverse sorts of security level for his/her information. We propose a framework, in which different sorts of encryption and unscrambling measures are been utilized as a part of a specific cloud. The client is utilized to choose the measures that must be utilized for his/her data's. The principles rely on the key length.


Keywords


Encryption, Unscrambling, Guidelines, Key Length.

Full Text:

PDF

References


]http://en.wikipedia.org/wiki/Cloud_computing

B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” IEEE Trans. Cloud Comput., vol. 2, no. 1, pp. 43–56, Jan.–Mar. 2014.

J. Xiong, Z. Yao, J. Ma, X. Liu, Q. Li, and J. Ma, “Priam: Privacy preserving identity and access management scheme in cloud,” KSII Trans. Internet Inf. Syst., vol. 8, no. 1, pp. 282–304, 2014

M. J. Wiener, “Cryptanalysis of short RSA secret exponents,” IEEE Transaction on Information Theory, Vol.36, No.3, pp. 553-558, May 1990.

Advanced Encryption Standard (AES), Nov. 26, 2001.

Xinmiao Zhang and Keshab K. Parhi,”Implementation approaches for the advanced encryption standard algorithm”, IEEE Transactions 1531-636X/12©2002IEEE.

W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed., Prentice Hall, 1999.

Jawahar Thakur, Nagesh Kumar,“DES,AES andBlowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis,“ in International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 1, Issue 2, December 2011), pp.6-12


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.