Open Access   Article Go Back

Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique

Akanksha Aasarmya1 , Sohit Agarwal2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-8 , Page no. 39-43, Aug-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i8.3943

Online published on Aug 31, 2019

Copyright © Akanksha Aasarmya, Sohit Agarwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Akanksha Aasarmya, Sohit Agarwal, “Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.39-43, 2019.

MLA Style Citation: Akanksha Aasarmya, Sohit Agarwal "Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique." International Journal of Computer Sciences and Engineering 7.8 (2019): 39-43.

APA Style Citation: Akanksha Aasarmya, Sohit Agarwal, (2019). Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique. International Journal of Computer Sciences and Engineering, 7(8), 39-43.

BibTex Style Citation:
@article{Aasarmya_2019,
author = {Akanksha Aasarmya, Sohit Agarwal},
title = {Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2019},
volume = {7},
Issue = {8},
month = {8},
year = {2019},
issn = {2347-2693},
pages = {39-43},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4786},
doi = {https://doi.org/10.26438/ijcse/v7i8.3943}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i8.3943}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4786
TI - Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Akanksha Aasarmya, Sohit Agarwal
PY - 2019
DA - 2019/08/31
PB - IJCSE, Indore, INDIA
SP - 39-43
IS - 8
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
572 483 downloads 234 downloads
  
  
           

Abstract

Cloud computing is an increasingly famous and growing technology which has led to a new dawn in the field of Information Technology. It has created a drastic change in the trend of different digital devices. Cloud Computing corresponds to both, the applications provided as services over the internet and the hardware elements and systems software in the data-centers that provide those respective services. In this paper, improving the security of data within the cloud when the data is migrated from one source to cloud or vice-versa, using an enhanced randomized encryption technique. During the analysis of providing security to a large amount of data in the cloud environment using various encryption techniques, we formulated that the asymmetric algorithms are incapable to encrypt a data in a bulk or in large amount when used singly. Security is the major issue in cloud computing system so we are using the concept of asymmetric algorithm when we are migrating one source file to the cloud.

Key-Words / Index Term

Cloud computing, Software as a services, Encryption, Asymmetric algorithms, RSA, AES

References

[1] Secure Migration of Various Databases over A Cross Platform Environment, an International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume 2 Issue 4 April, 2013.
[2] Understanding pricing and migration cost for Cloud adoption in business environments by Dimitris Monogenis, MSc Computing and Management 2011/2012.
[3] Mobile One Time Passwords and RC4 Encryption for Cloud Computing , Master’s Thesis in Computer Network Engineering by Markus Johnsson & A.S.M Faruque Azam.
[4] 15th International Conference on Management of Data COMAD 2009, Mysore, India, December 9–12, 2009 ©Computer Society of India, 2009, A Unified and Scalable Data Migration Service for the Cloud Environments.
[5] Data Migration: Connecting Databases in the Cloud, a research paper published by authors: Farah Habib Chanchary and Samiul Islam in ICCIT 2012.
[6] Using the cloud for data migration: practical issues and legal implications - 16 Feb 2011 - Computing Feature.
[7] Database security in the cloud by Imal Sakhi, Examensarbete inom Datateknik Grundnivå, 15 hp Stockholm 2012.
[8] A Symmetric Key Cryptographic Algorithm by Ayushi, ©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 15
[9] Microsoft Data Encryption Toolkit for Mobile PCs: Security Analysis Version 1.0, published: April 2007.
[10] “A Security approach for Data Migration in Cloud Computing”, an International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 ISSN 2250-3153.
[11] “Cloud computing a CRM Service Based on Separate Encryption and Decryption using Blowfish algorithm”, International Journal on Recent and Innovation Trends in Computing and Communication Volume: 1 Issue: 4 217 – 223
[12] Slim Trabelsi, Yves Roudier. , Research Report RR-06-164 Enabling Secure Service Discovery with Attribute Based Encryption.
[13] RSA algorithm achievement with federal information processing signature for data protection in cloud computing, International Journal of Computers & Technology, ISSN: 2277-3061 Volume 3. No. 1, AUG, 2012.
[14] International Journal of Scientific Research in Computer Sciences and Engineering (ISSN: 2320-7639)
[15] International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256)