Open Access Open Access  Restricted Access Subscription or Fee Access

Data Security and Privacy in Cloud Using RC6 and SHA Algorithms

O.M. Soundararajan, Y. Jenifer, S. Dhivya, T.K.P. Rajagopal

Abstract


In this paper we describe a new security designed data privacy and security in cloud storage system. The security algorithm is taken in different approaches to provide security in many cloud provider for cloud server. In cryptographic cloud implementation algorithms are Caesar cipher, RSA Algorithm, Vinegere Cipher, Homomorphic Encryption, RC Block Cipher, DES Algorithm etc.,. The cryptographic Encryption and Decryption taken as Client and server side processes. In Encryption process takes in Client side using an RC6 (Block Cipher Algorithm) and SHA3(Secure Hash Algorithm) before data store in the cloud server or cloud storage. The server side decryption is taken in Authentication methodology. The access data in cloud categorized in (Public, Hybrid and Private Cloud) Public cloud access in open access documents to view not download, the Hybrid User can access the document with authentication code from the cloud server system, Private User can Access all type of secured data get Authenticate from the client system or client Email code verification in the Cloud Data. Authentication process to prevent the intruder, malicious attacker, Inside Attacker, Outside Attacker


Keywords


Cloud Computing, RC6 Algorithm, SHA3 Algorithm, Cryptography, Encryption, Decryption, Security.

Full Text:

PDF

References


Securty and Privacy in Cloud Computing,Zhifeng Xiao and Yang Xiao, Senior Member, IEEE,IEEE Communications Surveys & Tutorials, vol. 15, no. 2, second quarter 2013, 1553-877x/13/$31.00

Learning the Caesar and Vigenere Cipher by Hierarchical Evolutionary Re-combination, Alan Blair, 2013 IEEE Congress on Evolutionary Computation June 20-23, Cancun, Mexico.

Enhancement of RC6 Block Cipher Algorithm andComparison with RC5 & RC6, Harsh Kumar Verma, Ravindra Kumar Singh, IEEE Transactions- 978-1-4673-4529-3/12/$31.00_c 2012 IEEE

On Data Staging Algorithms for SharedData Accesses in Clouds, Yang Wang, BharadwajVeeravalli, Senior Member, IEEE, and Chen-KhongTham, IEEE Transactions on parallel and distributed systems, vol. 24, no. 4,April 2013]]

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, Ming Li, Member, IEEE, Shucheng Yu, Member, IEEE, Yao Zheng IEEE Transactions on parallel and distributed systems, vol. 24, no. 1, January 2013

Study of Cloud Computing and Security Approaches, G. Murugaboopathi ,C.Chandravathy,P.Vinothkuamar, (IJSCE) VOl 3 Issue-1 March 2013.

Privacy and Security issues in Cloud Computing,AnitaKumari Nanda, Brojo Kishore Mishra, IJACR vol 2 Number-4 Issue 6 Dec 2012

The Basics of Cloud Computinghttp://csrc.nist.gov/publications/drafts/800-145/Drafts-SP-800-145-Cloud-Definition.pdf

Cloud computing http://www.wikipedia.ord/wiki/in/srn=1/Cloud_Computing.html

Cloud Computing RCC Algorithm to increase Data Security,A.Padmapriya, P.Subhasri, IJETT vol 4 Issue 4 Apr-2013

SHA3 Algorithm basics http://en.wikipedia.org/wiki/Secure_Hash_Standard.html

Storage Security http://www.informationweek.com/security/storage.html

Keecaks SHA3 Algorithm Spone Function http://keccak.noekeon.org/Keccak-f-State.pdf

Mastering of Cloud Computing-Data Security categories, Rajkumar Buyya,Christian vecchiola, S.ThamaraiSelvi

Data Structures and Algorithm Analysis in C,Mark Allen Weiss


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.