High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Obtaining Data Security using Cloud Computing and Cryptographic Algorithms

Author(s):

Deepthy S , Mount Zion College of Engineering,Kadammanitta; Vidya Vijayan, Mount Zion College of Engineering,Kadammanitta

Keywords:

AES, RSA and SHA-1 algorithm, Cloud Computing, Cryptographic Algorithms

Abstract

Cloud storage involves stashing data on hardware in a remote physical location, which can be accessed from any device via the internet. Clients send files to a data server maintained by a cloud provider instead of storing it on their own hard drives. It is readily manageable by the Internet, a cloud infrastructure can be accessed by enterprises easily and quickly. The data can be accessed from anywhere and anytime. In this paper we aim to provide a set of technology protection designed to protect resources from leakage, theft, or data loss. AES and RSA which are from symmetric, asymmetric cryptographic algorithm. We propose a combination of AES, RSA and SHA-1 algorithm for optimum cloud security. Our approach ensures the security and privacy of client sensitive information by storing data across single cloud, using AES, RSA and SHA-1 algorithm.

Other Details

Paper ID: IJSRDV7I100413
Published in: Volume : 7, Issue : 10
Publication Date: 01/01/2020
Page(s): 636-638

Article Preview

Download Article