Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 9
Page No. 494 - 505

A Survey on Data Encryption Tecniques in Cloud Computing

Authors : S. Balasubramaniam and V. Kavitha

References

Agrawal, M. and P. Mishra, 2012. A comparative survey on symmetric key encryption techniques. Int. J. Comput. Sci. Eng., 4: 877-882.
Direct Link  |  

Bouti, A. and A.J. Keller, 2012. Securing cloud-based computations against malicious providers. J. ACM SIGOPS Operating Syst., 46: 38-42.
CrossRef  |  Direct Link  |  

Buyya, R., C. Vecchiola and S.T. Selvi, 2013. Mastering Cloud Computing: Foundations and Applications Programming. 1st Edn., Morgan Kaufmann Publishers, ISBN-13: 978-0124114548, UK., Pages: 468.

Chauhan, E. and S. Vatta, 2013. Cyber security in data mining using homomorphic encryption. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 1147-1150.
Direct Link  |  

Chung, P.S., C.W. Liu and M.S. Hwang, 2014. A study of attribute-based proxy re-encryption scheme in cloud environments. Int. J. Network Secur., 16: 1-13.
Direct Link  |  

El-Etriby, S., E.M. Mohamed and H.S. Abdul-Kader, 2012. Modern encryption techniques for cloud computing: Randomness and performance testing. Proceedings of the 2nd International Conference on Communications and Information Technology, February 2012, Cambridge, UK., pp: 800-805.

Elminaam, D.S.A., H.M. Abdual-Kader and M.M. Hadhoud, 2010. Evaluating the performance of symmetric encryption algorithms. Int. J. Network Sec., 10: 216-222.
Direct Link  |  

Elminaam, D.S.A., H.M. Abdul Kader and M.M. Hadhoud, 2009. Performance evaluation of symmetric encryption algorithms. Commun. IBIMA, 8: 58-64.

Gast, M.S., 2002. 802.11 Wireless Networks: The Definitive Guide. O'Reilly Publisher, UK., pp: 70-76.

Gaurha, N. and M. Shrivastava, 2012. Data security in cloud computing using linear programming. Int. J. Emerging Technol. Adv. Eng., 2: 28-30.
Direct Link  |  

Gentry, C., 2010. Computing arbitrary functions of encrypted data. J. Commun. ACM, 53: 97-105.
CrossRef  |  Direct Link  |  

Idrus, S.Z.S., S.A. Aljunid, S.M. Asi, S. Sudin and R.B. Ahmad, 2008. Performance analysis of encryption algorithms' text length size on web browsers. Int. J. Comput. Sci. Network Secur., 8: 20-25.
Direct Link  |  

Inbarani, W.S., G. Shenbagamoorthy and C.K.C. Paul, 2013. Proxy re-encryption schemes for data storage security in cloud- a survey. Int. J. Eng. Res. Technol., 2: 1-5.

Jachak, K.B., S.K. Korde, P.P. Ghorpade and G.J. Gagare, 2012. Homomorphic authentication with random masking technique ensuring privacy and security in cloud computing. J. Bioinfo Secur. Inform., 2: 49-52.
Direct Link  |  

Jain, N. and G. Kaur, 2012. Implementing DES algorithm in cloud for data security. VSRD Int. J. Comput. Sci. Inform. Technol., 2: 316-321.
Direct Link  |  

Kalpana, P. and S. Singaraju, 2012. Data security in cloud computing using RSA algorithm. Int. J. Res. Comput. Commun. Technol., 1: 143-146.
Direct Link  |  

Kamara, S. and M. Raykova, 2013. Parallel Homomorphic Encryption. In: Financial Cryptography and Data Security, Adams, A.A., M. Brenner and M. Smith (Eds.). Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-642-41319-3, pp: 213-225.

Kaur, M. and M. Mahajan, 2012. Implementing various encryption algorithms to enhance the data security of cloud in cloud computing. Int. J. Comput. Sci. Inform. Technol., 2: 831-835.
Direct Link  |  

Khanna, L. and A. Jaiswal, 2013. Cloud computing: Security issues and description of encryption based algorithms to overcome them. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 279-283.
Direct Link  |  

Kumar, S.K. and S. Venkateswarlu, 2013. Efficiently providing data security and linear programming in cloud computing. Int. J. Comput. Sci. Res. Technol., 4: 630-632.

Lokhande, V. and P.P. Kumari, 2012. Efficient encryption and decryption services for cloud computing. Int. J. Social Appl. Comput. Sci., 1: 71-75.
Direct Link  |  

Meissen, R., 2012. A mathematical approach to fully homomorphic encryption. Ph.D. Thesis, Worcester Polytechnic Institute.

Nirmala, S.J., S.M.S. Bhanu and A.A. Patel, 2012. A comparative study of the secret sharing algorithms for secure data in the cloud. Int. J. Cloud Comput.: Serv. Archit., 2: 63-71.
Direct Link  |  

Seth, S.M. and R. Mishra, 2011. Comparative analysis of encryption algorithms for data communication. Int. J. Comput. Sci. Telecommun., 2: 292-294.
Direct Link  |  

Singh, G., A.K. Singla and K.S. Sandha, 2011. Through put analysis of various encryption algorithms. Int. J. Comput. Sci. Telecommun., Vol 2

Singh, S.P. and R. Maini, 2011. Comparison of data encryption algorithms. Int. J. Comput. Sci. Commun., 2: 125-127.
Direct Link  |  

Singha, N. and J.P.S.Raina, 2011. Comparative analysis of AES and RC4 algorithms for better utilization. Int. J. Comput. Trends Technol., 2011: 177-181.
Direct Link  |  

Song, X., H. Deng, L. Chen and M. Xiao, 2013. An efficient encryption and verification scheme for preserving electronic evidence in cloud computing. J. Inform. Comput. Sci., 10: 911-922.
Direct Link  |  

Soubhagya, B., G.V. Mini and A.J. Jeya Celin, 2013. A homomorphic encryption technique for scalable and secure sharing of personal health record in cloud computing. Int. J. Comput. Appl., 67: 40-44.
Direct Link  |  

Stallings, W., 2003. Cryptography and Network Security: Principles and Practice. 3rd Edn., Prentice Hall, London, UK., ISBN: 9780130914293, Pages: 681.

Tebaa, M., S. El Hajji and A. El Ghazi, 2012. Homomorphic encryption applied to the cloud computing security. Proceedings of the World Congress on Engineering, Volume 1, July 4-6, 2012, London, UK., pp: 1-4.

Verma, O.P., R. Agarwal, D. Dafouti and S. Tyagi, 2011. Peformance analysis of data encryption algorithms. Proceedings of the 3rd International Conference on Electronics Computer Technology, April 8-10, 2011, Kanyakumari, pp: 399-403.

Wang, C., Q. Wang, K. Ren and W. Lou, 2009. Ensuring data storage security in cloud computing. Proceedings of the 17th International Workshop on Quality of Service, July 13-15, 2009, Charleston, SC., USA., pp: 1-9.

Wang, G., Q. Liu, J. Wu and M. Guo, 2011. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur., 30: 320-331.
CrossRef  |  Direct Link  |  

Xiao, L., O. Bastani and I.L. Yen, 2012. An efficient homomorphic encryption protocol for multi-user systems. IACR Cryptology ePrint Archive, Pages: 193. https://eprint.iacr.org/2012/193.pdf.

Zhang, Z., T. Plantard and W. Susilo, 2012. Reaction attack on outsourced computing with fully homomorphic encryption schemes. Proceedings of the 14th International Conference on Information Security and Cryptology, November 30-December 2, 2011, Seoul, Korea, pp: 419-436.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved