Sri Vasavi College, Erode Self-Finance Wing 3rd February 2017 National Conference on Computer and Communication NCCC’17

Format: Volume 5, Issue 1, No 12, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: M.Saranya,Dr.T.Ramaprabha


View PDF Format


Cloud Computing is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network. The IT services of Cloud Computing are delivered by third party provider who owns the infrastructure. Benefits of cloud storage are easy access means access to your knowledge anyplace, anyhow, anytime, scalability, resilience, cost efficiency and high reliability of the data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. To secure the Cloud means secure the treatments (calculations) and storage (databases hosted by the Cloud provider). In this research paper, the proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.


[1] Sandipan Basu, International Data Encryption Algorithm (IDEA) A Typical Illustration‟, Journal of Global Research in Computer Science. July (2011) ISSN: 2229-371XVol. 2, [2] Alexa Huth and James Cebula „The Basics of Cloud Computing‟, United States Computer Emergency Readiness Team (2011). [ 3]Simar Preet Singh and Gurpinder Singh amra, „Managing Vulnerabilities‟ in Cloud Computing‟, National Conference on Engineering applications‟ (NCEA-2011), St. Solider Institute of Emerging Technology and Management, alandhar, Punjab. April 9 (2011). [4] I-Hsun Chuang, Syuan-Hao Li, Kuan-Chieh Huang, Yau-Hwang Kuo,” An Effective privacy protection scheme for cloud computing”,IEEE 2011. [5] Jianfeng Yang and Zhibin Chen,” Cloud Computing Research and Security Issues”, IEEE 2010. Sunita Rani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, [6] V. Sandhya, “A Study on Various Security Methods in Cloud Computing”, International Journal of Advanced Research in Computer Science, Volume 2, No.6, Nov-Dec 2011. [7]. Simarjeet Kaur, “Cryptography and Encryption in Cloud Computing”, VSRD International Journal of Computer Science and Information Technology, Vol.2(3), 242-249, 2012.


Cloud Computing, Cryptographic Algorithm, Infrastructure, Internet, Security Issue.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

Facebook IconYouTube IconTwitter IconVisit Our Blog